4.7
CVSSv3

CVE-2018-5407

Published: 15/11/2018 Updated: 07/11/2023
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 4.7 | Impact Score: 3.6 | Exploitability Score: 1
VMScore: 195
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

debian debian linux 8.0

debian debian linux 9.0

nodejs node.js

openssl openssl

tenable nessus

oracle primavera p6 enterprise project portfolio management 16.2

oracle api gateway 11.1.2.4.0

oracle primavera p6 enterprise project portfolio management 15.1

oracle primavera p6 enterprise project portfolio management 16.1

oracle primavera p6 enterprise project portfolio management 15.2

oracle peoplesoft enterprise peopletools 8.55

oracle primavera p6 enterprise project portfolio management 8.4

oracle peoplesoft enterprise peopletools 8.56

oracle enterprise manager ops center 12.3.3

oracle peoplesoft enterprise peopletools 8.57

oracle primavera p6 enterprise project portfolio management

oracle primavera p6 enterprise project portfolio management 18.8

oracle vm virtualbox

oracle enterprise manager base platform 13.2.0.0.0

oracle enterprise manager base platform 12.1.0.5.0

oracle tuxedo 12.1.1.0.0

oracle enterprise manager base platform 13.3.0.0.0

oracle application server 0.9.8

oracle application server 1.0.0

oracle application server 1.0.1

oracle mysql enterprise backup

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux server 7.6

Vendor Advisories

Several security issues were fixed in OpenSSL ...
Synopsis Moderate: ovmf security and enhancement update Type/Severity Security Advisory: Moderate Topic An update for ovmf is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base ...
Synopsis Moderate: Red Hat JBoss Web Server 52 security release Type/Severity Security Advisory: Moderate Topic Red Hat JBoss Web Server 520 zip release for RHEL 6, RHEL 7, RHEL 8 and Microsoft Windows is availableRed Hat Product Security has rated this update as having a security impactof Moderate A C ...
Synopsis Moderate: Red Hat JBoss Web Server 52 security release Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 520 packages are now available for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8Red Hat Product Security has rated thi ...
Synopsis Moderate: openssl security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for openssl is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) ba ...
Synopsis Moderate: Red Hat Ansible Tower 335 Type/Severity Security Advisory: Moderate Topic Red Hat Ansible Tower 335 Description For a list of changes included in this release, please read the Ansible Tower Release Notes: docsansiblecom/ansible-tower/latest/html/release-note ...
Synopsis Moderate: Red Hat Ansible Tower 343 Type/Severity Security Advisory: Moderate Topic Red Hat Ansible Tower 343 Description For a list of changes included in this release, please read the Ansible Tower Release Notes: docsansiblecom/ansible-tower/latest/html/release-note ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 Security Release Type/Severity Security Advisory: Important Topic Red Hat JBoss Core Services Pack Apache Server 2437 zip releasefor RHEL 6, RHEL 7 and Microsoft Windows is availableRed Hat Product Security has rated this update as ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 Security Release on RHEL 6 Type/Severity Security Advisory: Important Topic Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2437 and fix several bugs, and add various enhancements are now available for R ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2437 Security Release on RHEL 7 Type/Severity Security Advisory: Important Topic An update is now available for JBoss Core Services on RHEL 7Red Hat Product Security has rated this update as having a security impact of Important A Common ...
Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit For the stable distribution (stretch), these problems have been fixed in version 102q-1~deb9u1 Going forward, openssl10 security updates for stretch will be based on the 102x upstream relea ...
Several local side channel attacks and a denial of service via large Diffie-Hellman parameters were discovered in OpenSSL, a Secure Sockets Layer toolkit For the stable distribution (stretch), these problems have been fixed in version 110j-1~deb9u1 Going forward, openssl security updates for stretch will be based on the 110x upstream releases ...
A microprocessor side-channel vulnerability was found on SMT (eg, Hyper-Threading) architectures An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information (CVE-2018-5407) If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to s ...
A microprocessor side-channel vulnerability was found on SMT (eg, Hyper-Threading) architectures An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information(CVE-2018-5407) If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to sen ...
A microprocessor side-channel vulnerability was found on SMT (eg, Hyper-Threading) architectures An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information ...
A vulnerability has been found in the ECC scalar multiplication implementation of OpenSSL < 110i and <= 102p The implementation, used in eg ECDSA and ECDH, has been shown to be vulnerable to a microarchitecture timing side channel attack An attacker with sufficient access to mount local timing attacks during ECDSA signature generation ...
An industry-wide vulnerability has been reported which impacts CPUs that use Simultaneous Multithreading Technology (SMT) The attack consists of running a malicious process in parallel with legitimate processes using the parallel threading capabilities of SMT The legitimate process leaks small amounts of data to the malicious processes, which c ...
Nessus leverages third-party software to help provide underlying functionality One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of th ...
Nessus leverages third-party software to help provide underlying functionality One third-party component (OpenSSL) was found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address the potential impact of th ...

Exploits

# Summary This is a proof-of-concept exploit of the PortSmash microarchitecture attack, tracked by CVE-2018-5407 ![Alt text](parse_raw_simplepng?raw=true "Title") # Setup ## Prerequisites A CPU featuring SMT (eg Hyper-Threading) is the only requirement This exploit code should work out of the box on Skylake and Kaby Lake For other SMT a ...

Github Repositories

Summary This is a proof-of-concept exploit of the PortSmash microarchitecture attack, tracked by CVE-2018-5407 More technical details about the PortSmash side-channel are available in this manuscript License This software is licensed under the terms of the Apache License, Version 20 Check LICENSE and NOTICE for more details Setup Prerequisites A CPU featuring SMT (eg Hy

References

CWE-203https://github.com/bbbrumley/portsmashhttps://eprint.iacr.org/2018/1060.pdfhttps://www.exploit-db.com/exploits/45785/http://www.securityfocus.com/bid/105897https://lists.debian.org/debian-lts-announce/2018/11/msg00024.htmlhttps://security.netapp.com/advisory/ntap-20181126-0001/https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/https://www.debian.org/security/2018/dsa-4348https://usn.ubuntu.com/3840-1/https://www.debian.org/security/2018/dsa-4355https://www.tenable.com/security/tns-2018-17https://www.tenable.com/security/tns-2018-16https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlhttps://security.gentoo.org/glsa/201903-10https://access.redhat.com/errata/RHSA-2019:0483https://access.redhat.com/errata/RHSA-2019:0652https://access.redhat.com/errata/RHSA-2019:0651https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://access.redhat.com/errata/RHSA-2019:2125https://access.redhat.com/errata/RHSA-2019:3929https://access.redhat.com/errata/RHSA-2019:3935https://access.redhat.com/errata/RHSA-2019:3933https://access.redhat.com/errata/RHSA-2019:3931https://access.redhat.com/errata/RHSA-2019:3932https://www.oracle.com/security-alerts/cpujan2020.htmlhttps://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://support.f5.com/csp/article/K49711130?utm_source=f5support&%3Butm_medium=RSShttps://usn.ubuntu.com/3840-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/45785/