[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-3620Date: (C)2018-08-20   (M)2024-03-26


Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.6CVSS Score : 4.7
Exploit Score: 1.1Exploit Score: 3.4
Impact Score: 4.0Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: CHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
SECTRACK-1041451
BID-105080
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
DSA-4274
DSA-4279
FEDORA-2018-1c80fea1cd
FEDORA-2018-f8cba144ae
FreeBSD-SA-18:09
GLSA-201810-06
RHSA-2018:2384
RHSA-2018:2387
RHSA-2018:2388
RHSA-2018:2389
RHSA-2018:2390
RHSA-2018:2391
RHSA-2018:2392
RHSA-2018:2393
RHSA-2018:2394
RHSA-2018:2395
RHSA-2018:2396
RHSA-2018:2402
RHSA-2018:2403
RHSA-2018:2404
RHSA-2018:2602
RHSA-2018:2603
USN-3740-1
USN-3740-2
USN-3741-1
USN-3741-2
USN-3742-1
USN-3742-2
USN-3823-1
VU#982149
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
http://support.lenovo.com/us/en/solutions/LEN-24163
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
http://www.vmware.com/security/advisories/VMSA-2018-0021.html
http://xenbits.xen.org/xsa/advisory-273.html
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://foreshadowattack.eu/
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009
https://security.netapp.com/advisory/ntap-20180815-0001/
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://support.f5.com/csp/article/K95275140
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.synology.com/support/security/Synology_SA_18_45

CPE    462
cpe:/h:intel:core_i5:4670r
cpe:/h:intel:core_i7:4870hq
cpe:/h:intel:core_i5:3330
cpe:/h:intel:core_i5:4670s
...
CWE    1
CWE-203
OVAL    49
oval:org.secpod.oval:def:53402
oval:org.secpod.oval:def:114968
oval:org.secpod.oval:def:114967
oval:org.secpod.oval:def:1502309
...

© SecPod Technologies