Vulnerabilidad en sistemas con microprocesadores (CVE-2017-5754)
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
04/01/2018
Última modificación:
19/11/2021
Descripción
Los sistemas con microprocesadores con ejecución especulativa y predicción indirecta de ramas podrían permitir la revelación no autorizada de información al atacante con acceso de usuario local mediante un análisis de la caché de los datos.
Impacto
Puntuación base 3.x
5.60
Gravedad 3.x
MEDIA
Puntuación base 2.0
4.70
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:* | ||
cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4609
- http://nvidia.custhelp.com/app/answers/detail/a_id/4611
- http://nvidia.custhelp.com/app/answers/detail/a_id/4613
- http://nvidia.custhelp.com/app/answers/detail/a_id/4614
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
- http://www.kb.cert.org/vuls/id/584653
- http://www.securityfocus.com/bid/102378
- http://www.securityfocus.com/bid/106128
- http://www.securitytracker.com/id/1040071
- http://xenbits.xen.org/xsa/advisory-254.html
- https://access.redhat.com/errata/RHSA-2018:0292
- https://access.redhat.com/security/vulnerabilities/speculativeexecution
- https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
- https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
- https://cdrdv2.intel.com/v1/dl/getContent/685358
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- https://cert.vde.com/en-us/advisories/vde-2018-002
- https://cert.vde.com/en-us/advisories/vde-2018-003
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
- https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
- https://meltdownattack.com/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
- https://security.gentoo.org/glsa/201810-06
- https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
- https://security.netapp.com/advisory/ntap-20180104-0001/
- https://source.android.com/security/bulletin/2018-04-01
- https://support.citrix.com/article/CTX231399
- https://support.citrix.com/article/CTX234679
- https://support.f5.com/csp/article/K91229003
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
- https://support.lenovo.com/us/en/solutions/LEN-18282
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
- https://usn.ubuntu.com/3522-3/
- https://usn.ubuntu.com/3522-4/
- https://usn.ubuntu.com/3523-1/
- https://usn.ubuntu.com/3540-2/
- https://usn.ubuntu.com/3541-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3597-1/
- https://usn.ubuntu.com/3597-2/
- https://usn.ubuntu.com/usn/usn-3516-1/
- https://usn.ubuntu.com/usn/usn-3522-2/
- https://usn.ubuntu.com/usn/usn-3523-2/
- https://usn.ubuntu.com/usn/usn-3524-2/
- https://usn.ubuntu.com/usn/usn-3525-1/
- https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin
- https://www.debian.org/security/2018/dsa-4078
- https://www.debian.org/security/2018/dsa-4082
- https://www.debian.org/security/2018/dsa-4120
- https://www.kb.cert.org/vuls/id/180049
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
- https://www.synology.com/support/security/Synology_SA_18_01