mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
6.4 KiB
6.4 KiB
CVE-2017-5754
Description
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
POC
Reference
- http://www.kb.cert.org/vuls/id/584653
- https://cert.vde.com/en-us/advisories/vde-2018-002
- https://cert.vde.com/en-us/advisories/vde-2018-003
- https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://meltdownattack.com/
- https://usn.ubuntu.com/3540-2/
- https://usn.ubuntu.com/3597-2/
- https://usn.ubuntu.com/usn/usn-3525-1/
- https://www.kb.cert.org/vuls/id/180049
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
- https://www.synology.com/support/security/Synology_SA_18_01
Github
- https://github.com/3th1c4l-t0n1/awesome-csirt
- https://github.com/5l1v3r1/update_kernel
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Aakaashzz/Meltdown-Spectre
- https://github.com/BlessedRebuS/RISCV-Attacks
- https://github.com/Bogdantkachenkots/Windows10GamingFocus
- https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter
- https://github.com/Fineas/meltdown_vulnerability
- https://github.com/GregAskew/SpeculativeExecutionAssessment
- https://github.com/LawrenceHwang/PesterTest-Meltdown
- https://github.com/Lee-1109/SpeculativeAttackPoC
- https://github.com/LegitimateCharlatan/UCGlossary
- https://github.com/MachineThing/cve_lookup
- https://github.com/OSH-2018/4-uniqueufo
- https://github.com/OSH-2018/4-volltin
- https://github.com/PastorEmil/Vulnerability_Management
- https://github.com/PooyaAlamirpour/willyb321-stars
- https://github.com/Saiprasad16/MeltdownSpectre
- https://github.com/Spacial/awesome-csirt
- https://github.com/Spektykles/wip-kernel
- https://github.com/UnlimitedGirth/GamingOptimization
- https://github.com/Viralmaniar/In-Spectre-Meltdown
- https://github.com/abouchelliga707/ansible-role-server-update-reboot
- https://github.com/adamalston/Meltdown-Spectre
- https://github.com/ambynotcoder/C-libraries
- https://github.com/amstelchen/smc_gui
- https://github.com/anquanscan/sec-tools
- https://github.com/bhanukana/yum-update
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/compris-com/spectre-meltdown-checker
- https://github.com/danswinus/HWFW
- https://github.com/dotnetjoe/Meltdown-Spectre
- https://github.com/douyamv/MeltdownTool
- https://github.com/dubididum/Meltdown_Spectre_check
- https://github.com/edsonjt81/spectre-meltdown
- https://github.com/eecheng87/mode-switch-stat
- https://github.com/es0j/hyperbleed
- https://github.com/feffi/docker-spectre
- https://github.com/geeksniper/reverse-engineering-toolkit
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/github-3rr0r/TEApot
- https://github.com/gmolveau/starred
- https://github.com/gonoph/ansible-meltdown-spectre
- https://github.com/hackingportal/meltdownattack-and-spectre
- https://github.com/hannob/meltdownspectre-patches
- https://github.com/ionescu007/SpecuCheck
- https://github.com/jarmouz/spectre_meltdown
- https://github.com/jdmulloy/meltdown-aws-scanner
- https://github.com/jessb321/willyb321-stars
- https://github.com/jiegec/awesome-stars
- https://github.com/jungp0/Meltdown-Spectre
- https://github.com/kali973/spectre-meltdown-checker
- https://github.com/kaosagnt/ansible-everyday
- https://github.com/kevincoakley/puppet-spectre_meltdown
- https://github.com/kin-cho/my-spectre-meltdown-checker
- https://github.com/leonv024/update_kernel
- https://github.com/lnick2023/nicenice
- https://github.com/malevarro/WorkshopBanRep
- https://github.com/marcan/speculation-bugs
- https://github.com/mathse/meltdown-spectre-bios-list
- https://github.com/mbruzek/check-spectre-meltdown-ansible
- https://github.com/merlinepedra/Am-I-affected-by-Meltdown
- https://github.com/merlinepedra/spectre-meltdown-checker
- https://github.com/merlinepedra25/Am-I-affected-by-Meltdown
- https://github.com/merlinepedra25/spectre-meltdown-checker
- https://github.com/microsoft/SpeculationControl
- https://github.com/milouk/Efficient-Computing-in-a-Safe-Environment
- https://github.com/mjaggi-cavium/spectre-meltdown-checker
- https://github.com/mosajjal/Meltdown-Spectre-PoC
- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
- https://github.com/ommadawn46/HEVD-Exploit-Win10-22H2-KVAS
- https://github.com/pathakabhi24/Awesome-C
- https://github.com/projectboot/SpectreCompiled
- https://github.com/pvergain/github-stars
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/raphaelsc/Am-I-affected-by-Meltdown
- https://github.com/renjithgr/starred-repos
- https://github.com/ronaldogdm/Meltdown-Spectre
- https://github.com/rosenbergj/cpu-report
- https://github.com/ryandaniels/ansible-role-server-update-reboot
- https://github.com/savchenko/windows10
- https://github.com/sderosiaux/every-single-day-i-tldr
- https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script
- https://github.com/speecyy/Am-I-affected-by-Meltdown
- https://github.com/speed47/spectre-meltdown-checker
- https://github.com/ssstonebraker/meltdown_spectre
- https://github.com/stressboi/splunk-spectre-meltdown-uf-script
- https://github.com/timidri/puppet-meltdown
- https://github.com/tooru/meltdown-on-docker
- https://github.com/uhub/awesome-c
- https://github.com/v-lavrentikov/meltdown-spectre
- https://github.com/vintagesucks/awesome-stars
- https://github.com/vrdse/MeltdownSpectreReport
- https://github.com/vurtne/specter---meltdown--checker
- https://github.com/wangtao13/poc_fix_meltdown
- https://github.com/willyb321/willyb321-stars
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/zzado/Meltdown