ID

VAR-201702-0604


CVE

CVE-2017-5927


TITLE

ARM Vulnerabilities that allow side-channel attacks in processors

Trust: 0.8

sources: JVNDB: JVNDB-2017-001750

DESCRIPTION

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern ARM processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR. ARM Cortex A53 and so on are CPU processors of British ARM company. There are security vulnerabilities in many ARM processors. Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions. Little is known about this issue or its effects at this time. We will update this BID as more information emerges

Trust: 2.52

sources: NVD: CVE-2017-5927 // JVNDB: JVNDB-2017-001750 // CNVD: CNVD-2017-03136 // BID: 96459 // VULHUB: VHN-114130

AFFECTED PRODUCTS

vendor:samsungmodel:exynos 5800scope:eqversion: -

Trust: 1.6

vendor:intelmodel:celeron n2840scope:eqversion: -

Trust: 1.0

vendor:amdmodel:fx-8350 8-corescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3632qmscope:eqversion: -

Trust: 1.0

vendor:amdmodel:e-350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7 920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-2620qmscope:eqversion: -

Trust: 1.0

vendor:amdmodel:fx-8320 8-corescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5 m480scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700kscope:eqversion: -

Trust: 1.0

vendor:nvidiamodel:tegra k1 cd580m-a1scope:eqversion: -

Trust: 1.0

vendor:amdmodel:athlon ii 640 x4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2658 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom c2750scope:eqversion: -

Trust: 1.0

vendor:nvidiamodel:tegra k1 cd570m-a1scope:eqversion: -

Trust: 1.0

vendor:amdmodel:fx-8120 8-corescope:eqversion: -

Trust: 1.0

vendor:amdmodel:phenom 9550 4-corescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v5scope:eqversion: -

Trust: 1.0

vendor:allwinnermodel:a64scope:eqversion: -

Trust: 1.0

vendor:advanced micro devices amdmodel:athlon ii 640 x4scope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:e-350scope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:fx-8120 8-corescope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:fx-8320 8-corescope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:fx-8350 8-corescope: - version: -

Trust: 0.8

vendor:advanced micro devices amdmodel:phenom 9550 4-corescope: - version: -

Trust: 0.8

vendor:allwinnermodel:a64scope: - version: -

Trust: 0.8

vendor:nvidiamodel:tegra k1 cd570m-a1scope: - version: -

Trust: 0.8

vendor:nvidiamodel:tegra k1 cd580m-a1scope: - version: -

Trust: 0.8

vendor:intelmodel:atom c2750scope: - version: -

Trust: 0.8

vendor:intelmodel:celeron n2840scope: - version: -

Trust: 0.8

vendor:intelmodel:core i5 m480scope: - version: -

Trust: 0.8

vendor:intelmodel:core i7 920scope: - version: -

Trust: 0.8

vendor:intelmodel:core i7-2620qmscope: - version: -

Trust: 0.8

vendor:intelmodel:core i7-3632qmscope: - version: -

Trust: 0.8

vendor:intelmodel:core i7-4500uscope: - version: -

Trust: 0.8

vendor:intelmodel:core i7-6700kscope: - version: -

Trust: 0.8

vendor:intelmodel:xeon e3-1240 v5scope: - version: -

Trust: 0.8

vendor:intelmodel:xeon e5-2658 v2scope: - version: -

Trust: 0.8

vendor:samsungmodel:exynos 5800scope: - version: -

Trust: 0.8

vendor:armmodel:cortex a53scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2017-03136 // JVNDB: JVNDB-2017-001750 // CNNVD: CNNVD-201702-924 // NVD: CVE-2017-5927

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5927
value: HIGH

Trust: 1.0

NVD: CVE-2017-5927
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-03136
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201702-924
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114130
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-5927
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-03136
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-114130
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-5927
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-03136 // VULHUB: VHN-114130 // JVNDB: JVNDB-2017-001750 // CNNVD: CNNVD-201702-924 // NVD: CVE-2017-5927

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-114130 // JVNDB: JVNDB-2017-001750 // NVD: CVE-2017-5927

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-924

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201702-924

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-001750

PATCH

title:Patch for Multiple ARM Processor Information Disclosure Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/90740

Trust: 0.6

sources: CNVD: CNVD-2017-03136

EXTERNAL IDS

db:NVDid:CVE-2017-5927

Trust: 3.4

db:BIDid:96459

Trust: 2.8

db:JVNDBid:JVNDB-2017-001750

Trust: 0.8

db:CNVDid:CNVD-2017-03136

Trust: 0.6

db:CNNVDid:CNNVD-201702-924

Trust: 0.6

db:VULHUBid:VHN-114130

Trust: 0.1

sources: CNVD: CNVD-2017-03136 // VULHUB: VHN-114130 // BID: 96459 // JVNDB: JVNDB-2017-001750 // CNNVD: CNNVD-201702-924 // NVD: CVE-2017-5927

REFERENCES

url:http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf

Trust: 3.1

url:http://www.securityfocus.com/bid/96459

Trust: 2.5

url:https://www.vusec.net/projects/anc

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5927

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-5927

Trust: 0.8

url:https://www.vusec.net/projects/anc/

Trust: 0.8

url:http://www.intel.com/

Trust: 0.3

sources: CNVD: CNVD-2017-03136 // VULHUB: VHN-114130 // BID: 96459 // JVNDB: JVNDB-2017-001750 // CNNVD: CNNVD-201702-924 // NVD: CVE-2017-5927

CREDITS

B. Gras, K. Razavi, E. Bosman, H. Bos, C. Giuffrida,

Trust: 0.3

sources: BID: 96459

SOURCES

db:CNVDid:CNVD-2017-03136
db:VULHUBid:VHN-114130
db:BIDid:96459
db:JVNDBid:JVNDB-2017-001750
db:CNNVDid:CNNVD-201702-924
db:NVDid:CVE-2017-5927

LAST UPDATE DATE

2024-11-23T22:45:46.555000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-03136date:2017-03-23T00:00:00
db:VULHUBid:VHN-114130date:2017-03-02T00:00:00
db:BIDid:96459date:2017-03-07T01:08:00
db:JVNDBid:JVNDB-2017-001750date:2017-03-16T00:00:00
db:CNNVDid:CNNVD-201702-924date:2017-02-28T00:00:00
db:NVDid:CVE-2017-5927date:2024-11-21T03:28:41.017

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-03136date:2017-03-23T00:00:00
db:VULHUBid:VHN-114130date:2017-02-27T00:00:00
db:BIDid:96459date:2017-02-27T00:00:00
db:JVNDBid:JVNDB-2017-001750date:2017-03-16T00:00:00
db:CNNVDid:CNNVD-201702-924date:2017-02-28T00:00:00
db:NVDid:CVE-2017-5927date:2017-02-27T07:59:00.237