"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-08-20 17:00:45 +00:00
parent 18a2ae85dc
commit 6551cba4d5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
2 changed files with 51 additions and 2 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-18056",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in the Texas Instruments (TI) TM4C microcontroller series, such as the TM4C123. The eXecute-Only-Memory (XOM) implementation prevents code read-outs on protected memory by generating bus faults. However, single-stepping and using breakpoints is allowed in XOM-protected flash memory. As a consequence, it is possible to execute single instructions with arbitrary system states (e.g., registers, status flags, and SRAM content) and observe the state changes produced by the unknown instruction. An attacker could exploit this vulnerability by executing protected and unknown instructions with specific system states and observing the state changes. Based on the gathered information, it is possible to reverse-engineer the executed instructions. The processor acts as a kind of \"instruction oracle.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.usenix.org/system/files/woot19-paper_schink.pdf",
"url": "https://www.usenix.org/system/files/woot19-paper_schink.pdf"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://marketplace.atlassian.com/apps/4885/html-include-and-replace-macro?hosting=server&tab=versions",
"refsource": "MISC",
"name": "https://marketplace.atlassian.com/apps/4885/html-include-and-replace-macro?hosting=server&tab=versions"
},
{
"refsource": "MISC",
"name": "https://github.com/l0nax/CVE-2019-15053",
"url": "https://github.com/l0nax/CVE-2019-15053"
}
]
}