Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2018-3639

Description

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

POC

Reference

- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0

- https://seclists.org/bugtraq/2019/Jun/36

- https://usn.ubuntu.com/3655-1/

- https://usn.ubuntu.com/3777-3/

- https://www.exploit-db.com/exploits/44695/

- https://www.kb.cert.org/vuls/id/180049

- https://www.oracle.com/security-alerts/cpujul2020.html

- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/ARPSyndicate/cvemon

- https://github.com/C0dak/linux-exploit

- https://github.com/CKExploits/pwnlinux

- https://github.com/CyberHansel/WIN-Hardening

- https://github.com/NoelBradford/Windows11-Hardening-Powershell-Scripts

- https://github.com/PooyaAlamirpour/willyb321-stars

- https://github.com/Shuiliusheng/CVE-2018-3639-specter-v4-

- https://github.com/alyaparan/Spectre-Meltdown

- https://github.com/ambynotcoder/C-libraries

- https://github.com/amstelchen/smc_gui

- https://github.com/artifact0000/artifact229

- https://github.com/artifact493/artifact493

- https://github.com/axxia/axxia_atf

- https://github.com/carloscn/raspi-aft

- https://github.com/codexlynx/hardware-attacks-state-of-the-art

- https://github.com/danswinus/HWFW

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/edsonjt81/spectre-meltdown

- https://github.com/es0j/hyperbleed

- https://github.com/fengjixuchui/CPU-vulnerabiility-collections

- https://github.com/github-3rr0r/TEApot

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/houjingyi233/CPU-vulnerability-collections

- https://github.com/interlunar/win10-regtweak

- https://github.com/ionescu007/SpecuCheck

- https://github.com/jessb321/willyb321-stars

- https://github.com/jinb-park/linux-exploit

- https://github.com/kali973/spectre-meltdown-checker

- https://github.com/kaosagnt/ansible-everyday

- https://github.com/kdn111/linux-kernel-exploitation

- https://github.com/kevincoakley/puppet-spectre_meltdown

- https://github.com/khanhdn111/linux-kernel-exploitation

- https://github.com/khanhdz-06/linux-kernel-exploitation

- https://github.com/khanhdz191/linux-kernel-exploitation

- https://github.com/khanhhdz/linux-kernel-exploitation

- https://github.com/khanhhdz06/linux-kernel-exploitation

- https://github.com/khanhnd123/linux-kernel-exploitation

- https://github.com/khnhdz/linux-kernel-exploitation

- https://github.com/kin-cho/my-spectre-meltdown-checker

- https://github.com/knd06/linux-kernel-exploitation

- https://github.com/malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate

- https://github.com/merlinepedra/spectre-meltdown-checker

- https://github.com/merlinepedra25/spectre-meltdown-checker

- https://github.com/microsoft/SpeculationControl

- https://github.com/milouk/Efficient-Computing-in-a-Safe-Environment

- https://github.com/mjaggi-cavium/spectre-meltdown-checker

- https://github.com/mmxsrup/CVE-2018-3639

- https://github.com/morning21/Spectre_Meltdown_MDS_srcs

- https://github.com/ndk06/linux-kernel-exploitation

- https://github.com/ndk191/linux-kernel-exploitation

- https://github.com/nmosier/clou-bugs

- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance

- https://github.com/pathakabhi24/Awesome-C

- https://github.com/rosenbergj/cpu-report

- https://github.com/savchenko/windows10

- https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script

- https://github.com/speed47/spectre-meltdown-checker

- https://github.com/ssr-111/linux-kernel-exploitation

- https://github.com/timidri/puppet-meltdown

- https://github.com/tyhicks/ssbd-tools

- https://github.com/uhub/awesome-c

- https://github.com/v-lavrentikov/meltdown-spectre

- https://github.com/vintagesucks/awesome-stars

- https://github.com/vurtne/specter---meltdown--checker

- https://github.com/willyb321/willyb321-stars

- https://github.com/wkhnh06/linux-kernel-exploitation

- https://github.com/xairy/linux-kernel-exploitation

- https://github.com/yardenshafir/MitigationFlagsCliTool