2017-10-16 12:31:07 -04:00
{
2019-03-18 00:30:31 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secure@intel.com" ,
"DATE_PUBLIC" : "2018-01-03T00:00:00" ,
"ID" : "CVE-2017-5753" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Most Modern Operating Systems" ,
"version" : {
"version_data" : [
{
"version_value" : "All"
}
]
}
}
]
} ,
"vendor_name" : "Intel Corporation"
}
2018-04-18 22:05:58 -04:00
]
2019-03-18 00:30:31 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Information Disclosure"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" ,
"refsource" : "CONFIRM" ,
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
} ,
{
"name" : "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
} ,
{
"name" : "DSA-4187" ,
"refsource" : "DEBIAN" ,
"url" : "https://www.debian.org/security/2018/dsa-4187"
} ,
{
"name" : "USN-3542-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3542-2/"
} ,
{
"name" : "GLSA-201810-06" ,
"refsource" : "GENTOO" ,
"url" : "https://security.gentoo.org/glsa/201810-06"
} ,
{
"name" : "USN-3540-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3540-2/"
} ,
{
"name" : "https://access.redhat.com/security/vulnerabilities/speculativeexecution" ,
"refsource" : "CONFIRM" ,
"url" : "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
} ,
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" ,
"refsource" : "CONFIRM" ,
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
} ,
{
"name" : "USN-3597-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3597-1/"
} ,
{
"name" : "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
} ,
{
"name" : "SUSE-SU-2018:0012" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
} ,
{
"name" : "SUSE-SU-2018:0011" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
} ,
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" ,
"refsource" : "CONFIRM" ,
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
} ,
{
"name" : "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" ,
"refsource" : "MISC" ,
"url" : "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
} ,
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-002" ,
"refsource" : "CONFIRM" ,
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-002"
} ,
{
"name" : "USN-3580-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3580-1/"
} ,
{
"name" : "https://support.f5.com/csp/article/K91229003" ,
"refsource" : "CONFIRM" ,
"url" : "https://support.f5.com/csp/article/K91229003"
} ,
{
"name" : "openSUSE-SU-2018:0022" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
} ,
{
"name" : "DSA-4188" ,
"refsource" : "DEBIAN" ,
"url" : "https://www.debian.org/security/2018/dsa-4188"
} ,
{
"name" : "RHSA-2018:0292" ,
"refsource" : "REDHAT" ,
"url" : "https://access.redhat.com/errata/RHSA-2018:0292"
} ,
{
"name" : "http://xenbits.xen.org/xsa/advisory-254.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://xenbits.xen.org/xsa/advisory-254.html"
} ,
{
"name" : "https://security.netapp.com/advisory/ntap-20180104-0001/" ,
"refsource" : "CONFIRM" ,
"url" : "https://security.netapp.com/advisory/ntap-20180104-0001/"
} ,
{
"name" : "https://www.synology.com/support/security/Synology_SA_18_01" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.synology.com/support/security/Synology_SA_18_01"
} ,
{
"name" : "https://01.org/security/advisories/intel-oss-10002" ,
"refsource" : "CONFIRM" ,
"url" : "https://01.org/security/advisories/intel-oss-10002"
} ,
{
"name" : "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" ,
"refsource" : "MISC" ,
"url" : "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
} ,
{
"name" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
} ,
{
"name" : "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
} ,
{
"name" : "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" ,
"refsource" : "CONFIRM" ,
"url" : "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
} ,
{
"name" : "VU#584653" ,
"refsource" : "CERT-VN" ,
"url" : "http://www.kb.cert.org/vuls/id/584653"
} ,
{
"name" : "VU#180049" ,
"refsource" : "CERT-VN" ,
"url" : "https://www.kb.cert.org/vuls/id/180049"
} ,
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-003" ,
"refsource" : "CONFIRM" ,
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-003"
} ,
{
"name" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" ,
"refsource" : "CONFIRM" ,
"url" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
} ,
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
} ,
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" ,
"refsource" : "CONFIRM" ,
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
} ,
{
"name" : "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
} ,
{
"name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" ,
"refsource" : "CONFIRM" ,
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
} ,
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us" ,
"refsource" : "CONFIRM" ,
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
} ,
{
"name" : "USN-3549-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3549-1/"
} ,
{
"name" : "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
} ,
{
"name" : "https://support.citrix.com/article/CTX231399" ,
"refsource" : "CONFIRM" ,
"url" : "https://support.citrix.com/article/CTX231399"
} ,
{
"name" : "https://spectreattack.com/" ,
"refsource" : "MISC" ,
"url" : "https://spectreattack.com/"
} ,
{
"name" : "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" ,
"refsource" : "CONFIRM" ,
"url" : "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
} ,
{
"name" : "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" ,
"refsource" : "CONFIRM" ,
"url" : "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
} ,
{
"name" : "1040071" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1040071"
} ,
{
"name" : "102371" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/102371"
} ,
{
"name" : "USN-3597-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3597-2/"
} ,
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" ,
"refsource" : "CONFIRM" ,
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
} ,
{
"name" : "SUSE-SU-2018:0010" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
} ,
{
"name" : "USN-3540-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3540-1/"
} ,
{
"name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities" ,
"refsource" : "CISCO" ,
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
} ,
{
"name" : "USN-3516-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/usn/usn-3516-1/"
} ,
{
"name" : "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
} ,
{
"name" : "43427" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/43427/"
} ,
{
"name" : "USN-3541-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3541-1/"
} ,
{
"name" : "USN-3541-2" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3541-2/"
} ,
{
"name" : "USN-3542-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/3542-1/"
} ,
{
"name" : "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" ,
"refsource" : "MISC" ,
"url" : "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
} ,
{
"name" : "https://support.lenovo.com/us/en/solutions/LEN-18282" ,
"refsource" : "CONFIRM" ,
"url" : "https://support.lenovo.com/us/en/solutions/LEN-18282"
} ,
{
"name" : "openSUSE-SU-2018:0023" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
} ,
{
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" ,
"refsource" : "CONFIRM" ,
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
}
]
}
}