From 6551cba4d54d02bcaafb3e80d9a269482da817d0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 20 Aug 2019 17:00:45 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/18xxx/CVE-2018-18056.json | 48 ++++++++++++++++++++++++++++++++-- 2019/15xxx/CVE-2019-15053.json | 5 ++++ 2 files changed, 51 insertions(+), 2 deletions(-) diff --git a/2018/18xxx/CVE-2018-18056.json b/2018/18xxx/CVE-2018-18056.json index 15a43565305..9cf9153917d 100644 --- a/2018/18xxx/CVE-2018-18056.json +++ b/2018/18xxx/CVE-2018-18056.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18056", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Texas Instruments (TI) TM4C microcontroller series, such as the TM4C123. The eXecute-Only-Memory (XOM) implementation prevents code read-outs on protected memory by generating bus faults. However, single-stepping and using breakpoints is allowed in XOM-protected flash memory. As a consequence, it is possible to execute single instructions with arbitrary system states (e.g., registers, status flags, and SRAM content) and observe the state changes produced by the unknown instruction. An attacker could exploit this vulnerability by executing protected and unknown instructions with specific system states and observing the state changes. Based on the gathered information, it is possible to reverse-engineer the executed instructions. The processor acts as a kind of \"instruction oracle.\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.usenix.org/system/files/woot19-paper_schink.pdf", + "url": "https://www.usenix.org/system/files/woot19-paper_schink.pdf" } ] } diff --git a/2019/15xxx/CVE-2019-15053.json b/2019/15xxx/CVE-2019-15053.json index 96ab83b7749..7a5a2fdac93 100644 --- a/2019/15xxx/CVE-2019-15053.json +++ b/2019/15xxx/CVE-2019-15053.json @@ -56,6 +56,11 @@ "url": "https://marketplace.atlassian.com/apps/4885/html-include-and-replace-macro?hosting=server&tab=versions", "refsource": "MISC", "name": "https://marketplace.atlassian.com/apps/4885/html-include-and-replace-macro?hosting=server&tab=versions" + }, + { + "refsource": "MISC", + "name": "https://github.com/l0nax/CVE-2019-15053", + "url": "https://github.com/l0nax/CVE-2019-15053" } ] }