Files
CVEs-PoC/2018/CVE-2018-12207.md
T
2024-06-18 02:51:15 +02:00

31 lines
1.4 KiB
Markdown

### [CVE-2018-12207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207)
![](https://img.shields.io/static/v1?label=Product&message=2019.2%20IPU%20%E2%80%93%20Intel(R)%20Processor%20Machine%20Check%20Error&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service&color=brighgreen)
### Description
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujul2020.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Live-Hack-CVE/CVE-2018-12207
- https://github.com/amstelchen/smc_gui
- https://github.com/edsonjt81/spectre-meltdown
- https://github.com/es0j/hyperbleed
- https://github.com/kali973/spectre-meltdown-checker
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/kin-cho/my-spectre-meltdown-checker
- https://github.com/merlinepedra/spectre-meltdown-checker
- https://github.com/merlinepedra25/spectre-meltdown-checker
- https://github.com/speed47/spectre-meltdown-checker
- https://github.com/wravoc/harden-dragonflybsd
- https://github.com/wravoc/harden-freebsd
- https://github.com/wravoc/harden-ghostbsd