Files
CVEs-PoC/2018/CVE-2018-3620.md
T
2024-06-18 02:51:15 +02:00

45 lines
2.1 KiB
Markdown

### [CVE-2018-3620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620)
![](https://img.shields.io/static/v1?label=Product&message=Multiple&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen)
### Description
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
### POC
#### Reference
- https://access.redhat.com/errata/RHSA-2018:2393
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.kb.cert.org/vuls/id/982149
- https://www.oracle.com/security-alerts/cpujul2020.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Lee-1109/SpeculativeAttackPoC
- https://github.com/amstelchen/smc_gui
- https://github.com/blitz/l1tf-demo
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/edsonjt81/spectre-meltdown
- https://github.com/elivepatch/livepatch-overlay
- https://github.com/es0j/hyperbleed
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/github-3rr0r/TEApot
- https://github.com/houseofxyz/CVE-2020-17382
- https://github.com/interlunar/win10-regtweak
- https://github.com/ionescu007/SpecuCheck
- https://github.com/kali973/spectre-meltdown-checker
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/kin-cho/my-spectre-meltdown-checker
- https://github.com/merlinepedra/spectre-meltdown-checker
- https://github.com/merlinepedra25/spectre-meltdown-checker
- https://github.com/microsoft/SpeculationControl
- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
- https://github.com/rosenbergj/cpu-report
- https://github.com/savchenko/windows10
- https://github.com/speed47/spectre-meltdown-checker
- https://github.com/timidri/puppet-meltdown
- https://github.com/vurtne/specter---meltdown--checker