mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
164 lines
6.3 KiB
JSON
164 lines
6.3 KiB
JSON
{
|
|
"id": "CVE-2020-10255",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2020-03-10T16:15:15.990",
|
|
"lastModified": "2020-03-16T15:23:07.183",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Modern DRAM chips (DDR4 and LPDDR4 after 2015) are affected by a vulnerability in deployment of internal mitigations against RowHammer attacks known as Target Row Refresh (TRR), aka the TRRespass issue. To exploit this vulnerability, the attacker needs to create certain access patterns to trigger bit flips on affected memory modules, aka a Many-sided RowHammer attack. This means that, even when chips advertised as RowHammer-free are used, attackers may still be able to conduct privilege-escalation attacks against the kernel, conduct privilege-escalation attacks against the Sudo binary, and achieve cross-tenant virtual-machine access by corrupting RSA keys. The issue affects chips produced by SK Hynix, Micron, and Samsung. NOTE: tracking DRAM supply-chain issues is not straightforward because a single product model from a single vendor may use DRAM chips from different manufacturers."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los chips DRAM modernos (DDR4 y LPDDR4 despu\u00e9s de 2015) est\u00e1n afectados por una vulnerabilidad en la implementaci\u00f3n de mitigaciones internas contra los ataques de tipo RowHammer conocido como Target Row Refresh (TRR), tambi\u00e9n se conoce como el problema TRRespass. Para explotar esta vulnerabilidad, el atacante requiere crear determinados patrones de acceso para activar cambios de bits sobre los m\u00f3dulos de memoria afectados, tambi\u00e9n se conoce como un ataque de tipo RowHammer de Muchos Flancos. Esto significa que, incluso cuando son usados chips anunciados como RowHammer-free, los atacantes a\u00fan pueden ser capaces de dirigir ataques de escalada de privilegios contra el kernel, conducir ataques de escalada de privilegios contra el binario Sudo y lograr el acceso a m\u00e1quinas virtuales entre inquilinos al corromper claves RSA. El problema afecta a los chips producidos por SK Hynix, Micron y Samsung. NOTA: el seguimiento de los problemas de la cadena de suministro de DRAM no es sencillo porque un solo modelo de producto de un \u00fanico proveedor puede usar chips DRAM de diferentes fabricantes."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.0,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 6.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:micron:ddr4_sdram:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C61E4ABB-8D8E-4EF0-9FCC-864DCA8862BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:micron:lpddr4:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4024237B-254C-4A65-8263-12FED692D155"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:samsung:ddr4:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9704C77-A81A-4C71-9CD5-43D2C90EF574"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:samsung:lpddr4:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51C71653-2974-4151-98A9-831E5C08C5D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:skhynix:ddr4_sdram:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "582FC9BC-EC95-4002-944C-4453879108F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:skhynix:lpddr4:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "429192DE-1D08-488F-93A6-3F5F467FC210"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://download.vusec.net/papers/trrespass_sp20.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/vusec/trrespass",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Product"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://thehackernews.com/2020/03/rowhammer-vulnerability-ddr4-dram.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://twitter.com/antumbral/status/1237425959407513600",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://twitter.com/vu5ec/status/1237399112590467072",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.vusec.net/projects/trrespass/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |