Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2017-5753

Description

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

POC

Reference

- http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html

- http://www.kb.cert.org/vuls/id/584653

- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

- https://cert.vde.com/en-us/advisories/vde-2018-002

- https://cert.vde.com/en-us/advisories/vde-2018-003

- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

- https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes

- https://seclists.org/bugtraq/2019/Jun/36

- https://spectreattack.com/

- https://usn.ubuntu.com/3540-1/

- https://usn.ubuntu.com/3540-2/

- https://usn.ubuntu.com/3541-1/

- https://usn.ubuntu.com/3542-2/

- https://usn.ubuntu.com/3580-1/

- https://usn.ubuntu.com/3597-2/

- https://usn.ubuntu.com/usn/usn-3516-1/

- https://www.exploit-db.com/exploits/43427/

- https://www.kb.cert.org/vuls/id/180049

- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001

- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

- https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/

- https://www.synology.com/support/security/Synology_SA_18_01

Github

- https://github.com/00052/spectre-attack-example

- https://github.com/20142995/sectool

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Aakaashzz/Meltdown-Spectre

- https://github.com/AgenticAI-LLM/Hackathon

- https://github.com/BlessedRebuS/RISCV-Attacks

- https://github.com/C0dak/linux-exploit

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter

- https://github.com/EdwardOwusuAdjei/Spectre-PoC

- https://github.com/Eugnis/spectre-attack

- https://github.com/GarnetSunset/CiscoSpectreTakeover

- https://github.com/GhostTroops/TOP

- https://github.com/GianLucaSpagnolo/Informe-Orgacomp-2023

- https://github.com/GregAskew/SpeculativeExecutionAssessment

- https://github.com/HacTF/poc--exp

- https://github.com/JERRY123S/all-poc

- https://github.com/KiRinXC/SCA-PoCs

- https://github.com/Lee-1109/SpeculativeAttackPoC

- https://github.com/OscarLGH/spectre-v1.1-fr

- https://github.com/OscarLGH/spectre-v1.2-fr

- https://github.com/PastorEmil/Vulnerability_Management

- https://github.com/Saiprasad16/MeltdownSpectre

- https://github.com/SourceryAI/Deep-Security-Reports

- https://github.com/Spektykles/wip-kernel

- https://github.com/abouchelliga707/ansible-role-server-update-reboot

- https://github.com/adamalston/Meltdown-Spectre

- https://github.com/albertleecn/cve-2017-5753

- https://github.com/alyaparan/Spectre-Meltdown

- https://github.com/ambynotcoder/C-libraries

- https://github.com/amstelchen/smc_gui

- https://github.com/anquanscan/sec-tools

- https://github.com/asm/deep_spectre

- https://github.com/bhanukana/yum-update

- https://github.com/chaitanyarahalkar/Spectre-PoC

- https://github.com/chuangshizhiqiang/selfModify

- https://github.com/codexlynx/hardware-attacks-state-of-the-art

- https://github.com/compris-com/spectre-meltdown-checker

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/danswinus/HWFW

- https://github.com/dgershman/sidecheck

- https://github.com/dingelish/SGXfail

- https://github.com/dotnetjoe/Meltdown-Spectre

- https://github.com/douyamv/MeltdownTool

- https://github.com/edsonjt81/spectre-meltdown

- https://github.com/eecheng87/mode-switch-stat

- https://github.com/enderquestral/Reactifence-Thesis

- https://github.com/es0j/hyperbleed

- https://github.com/feffi/docker-spectre

- https://github.com/garnetsunset/CiscoSpectreTakeover

- https://github.com/geeksniper/reverse-engineering-toolkit

- https://github.com/giterlizzi/secdb-feeds

- https://github.com/github-3rr0r/TEApot

- https://github.com/gonoph/ansible-meltdown-spectre

- https://github.com/hackingportal/meltdownattack-and-spectre

- https://github.com/hannob/meltdownspectre-patches

- https://github.com/hayannoon/spectre-cpu-pinning

- https://github.com/hktalent/TOP

- https://github.com/igaozp/awesome-stars

- https://github.com/ionescu007/SpecuCheck

- https://github.com/ixtal23/spectreScope

- https://github.com/jarmouz/spectre_meltdown

- https://github.com/jbmihoub/all-poc

- https://github.com/jiegec/awesome-stars

- https://github.com/jinb-park/linux-exploit

- https://github.com/jungp0/Meltdown-Spectre

- https://github.com/kali973/spectre-meltdown-checker

- https://github.com/kaosagnt/ansible-everyday

- https://github.com/kin-cho/my-spectre-meltdown-checker

- https://github.com/lizeren/spectre-latitude

- https://github.com/lnick2023/nicenice

- https://github.com/lovesec/spectre---attack

- https://github.com/m8urnett/Windows-Spectre-Meltdown-Mitigations

- https://github.com/malevarro/WorkshopBanRep

- https://github.com/marcan/speculation-bugs

- https://github.com/mathse/meltdown-spectre-bios-list

- https://github.com/mbruzek/check-spectre-meltdown-ansible

- https://github.com/merlinepedra/spectre-meltdown-checker

- https://github.com/merlinepedra25/spectre-meltdown-checker

- https://github.com/mjaggi-cavium/spectre-meltdown-checker

- https://github.com/n0-traces/cve_monitor

- https://github.com/nishanb/insecure-app

- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance

- https://github.com/ozGod-sh/Declencheur-CVE

- https://github.com/pandatix/nvdapi

- https://github.com/pathakabhi24/Awesome-C

- https://github.com/pedrolucasoliva/spectre-attack-demo

- https://github.com/poilynx/spectre-attack-example

- https://github.com/projectboot/SpectreCompiled

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/rellow/jason

- https://github.com/ronaldogdm/Meltdown-Spectre

- https://github.com/rosenbergj/cpu-report

- https://github.com/ryandaniels/ansible-role-server-update-reboot

- https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-

- https://github.com/savchenko/windows10

- https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script

- https://github.com/sourcery-ai-bot/Deep-Security-Reports

- https://github.com/speed47/spectre-meltdown-checker

- https://github.com/ssstonebraker/meltdown_spectre

- https://github.com/timidri/puppet-meltdown

- https://github.com/uhub/awesome-c

- https://github.com/v-lavrentikov/meltdown-spectre

- https://github.com/vrdse/MeltdownSpectreReport

- https://github.com/vurtne/specter---meltdown--checker

- https://github.com/wateroot/poc-exp

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xymeng16/security