Vulnerability Name: | CVE-2017-5925 (CCN-123609) | ||||||||||||
Assigned: | 2017-02-27 | ||||||||||||
Published: | 2017-02-27 | ||||||||||||
Updated: | 2017-03-02 | ||||||||||||
Summary: | Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern Intel processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
3.3 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-5925 Source: MISC Type: Exploit, Technical Description, Third Party Advisory http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf Source: CCN Type: Intel Web site Intel | Data Center Solutions, IOT, and PC Innovation Source: BID Type: UNKNOWN 96452 Source: CCN Type: BID-96452 Multiple Intel Processor CVE-2017-5925 Local Security Bypass Vulnerability Source: XF Type: UNKNOWN intel-cpu-cve20175925-info-disc(123609) Source: MISC Type: Exploit, Technical Description, Third Party Advisory https://www.vusec.net/projects/anc Source: CCN Type: VUSec Web site Address Space Layout Randomization | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |