[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-3646Date: (C)2018-08-16   (M)2024-03-26


Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.6CVSS Score : 4.7
Exploit Score: 1.1Exploit Score: 3.4
Impact Score: 4.0Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: CHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
SECTRACK-1041451
SECTRACK-1042004
BID-105080
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
DSA-4274
DSA-4279
FEDORA-2018-1c80fea1cd
FEDORA-2018-f8cba144ae
FreeBSD-SA-18:09
GLSA-201810-06
RHSA-2018:2384
RHSA-2018:2387
RHSA-2018:2388
RHSA-2018:2389
RHSA-2018:2390
RHSA-2018:2391
RHSA-2018:2392
RHSA-2018:2393
RHSA-2018:2394
RHSA-2018:2395
RHSA-2018:2396
RHSA-2018:2402
RHSA-2018:2403
RHSA-2018:2404
RHSA-2018:2602
RHSA-2018:2603
USN-3740-1
USN-3740-2
USN-3741-1
USN-3741-2
USN-3742-1
USN-3742-2
USN-3756-1
USN-3823-1
VU#982149
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
http://support.lenovo.com/us/en/solutions/LEN-24163
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
http://www.vmware.com/security/advisories/VMSA-2018-0020.html
http://xenbits.xen.org/xsa/advisory-273.html
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://foreshadowattack.eu/
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010
https://security.netapp.com/advisory/ntap-20180815-0001/
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://support.f5.com/csp/article/K31300402
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.synology.com/support/security/Synology_SA_18_45

CPE    462
cpe:/h:intel:core_i5:4670r
cpe:/h:intel:core_i7:4870hq
cpe:/h:intel:core_i5:3330
cpe:/h:intel:core_i5:4670s
...
OVAL    67
oval:org.secpod.oval:def:89002176
oval:org.secpod.oval:def:53402
oval:org.secpod.oval:def:114968
oval:org.secpod.oval:def:114967
...

© SecPod Technologies