Executive Summary

Summary
Title Windows 7 and Windows Server 2008 R2 x64 fail to protect kernel memory when the Microsoft update for meltdown is installed
Informations
Name VU#277400 First vendor Publication 2018-03-29
Vendor VU-CERT Last vendor Modification 2018-04-24
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#277400

Windows 7 and Windows Server 2008 R2 x64 fail to protect kernel memory when the Microsoft update for meltdown is installed

Original Release date: 29 Mar 2018 | Last revised: 24 Apr 2018

Overview

When the Microsoft update for meltdown is installed on a Windows 7 x64 or Windows Server 2008 R2 x64 system, an unprivileged process may be able to read and write the entire memory space available to the Windows kernel.

Description

The update that Microsoft has released for meltdown on x64 versions of Windows 7 and Windows Server 2008 R2 incorrectly sets the permission bit for memory accessible from unprivileged user space. As a result, such platforms that have the meltdown update installed, which was released in January 2018 will not properly protect the contents of system memory..

Impact

An attacker with the ability to run code on an affected platform as an unprivileged user may be able to read from and write to the entire contents of system memory. Exploit code that uses this vulnerability to escalate privileges from an unprivileged user to SYSTEM privileges is publicly available.

Solution

Apply an update

This issue is addressed in the Microsoft update for CVE-2018-1038.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
MicrosoftAffected-29 Mar 2018
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.8AV:L/AC:L/Au:S/C:C/I:C/A:C
Temporal5.9E:H/RL:OF/RC:C
Environmental5.9CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

  • https://www.kb.cert.org/vuls/id/584653
  • http://blog.frizk.net/2018/03/total-meltdown.html
  • https://blog.xpnsec.com/total-meltdown-cve-2018-1038/
  • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038

Credit

This vulnerability was publicly reported by Ulf Frisk.

This document was written by Will Dormann.

Other Information

  • CVE IDs:CVE-2018-1038
  • Date Public:27 Mar 2018
  • Date First Published:29 Mar 2018
  • Date Last Updated:24 Apr 2018
  • Document Revision:24

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/277400

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1

Snort® IPS/IDS

Date Description
2018-05-29 Total Meltdown side-channel information leak attempt
RuleID : 46432 - Revision : 1 - Type : OS-WINDOWS
2018-05-29 Total Meltdown side-channel information leak attempt
RuleID : 46431 - Revision : 1 - Type : OS-WINDOWS
2018-05-29 Total Meltdown side-channel information leak attempt
RuleID : 46430 - Revision : 1 - Type : OS-WINDOWS
2018-05-29 Total Meltdown side-channel information leak attempt
RuleID : 46429 - Revision : 1 - Type : OS-WINDOWS

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2018-05-02 21:23:36
  • Multiple Updates
2018-04-24 17:18:41
  • Multiple Updates
2018-04-02 21:18:56
  • Multiple Updates
2018-03-30 17:18:48
  • Multiple Updates
2018-03-30 00:18:43
  • First insertion