Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-8897 | First vendor Publication | 2018-05-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.8 | ||
Base Score | 7.8 | Environmental Score | 7.8 |
impact SubScore | 5.9 | Temporal Score | 7.8 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-362 | Race Condition |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-07-10 | Microsoft Windows Interrupt Service Routine stack rollback attempt RuleID : 46910 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-10 | Microsoft Windows Interrupt Service Routine stack rollback attempt RuleID : 46909 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-10 | Microsoft Windows processor modification return to user-mode attempt RuleID : 46908 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-10 | Microsoft Windows processor modification return to user-mode attempt RuleID : 46907 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-10 | Microsoft Windows malicious CONTEXT structure creation attempt RuleID : 46906 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-10 | Microsoft Windows malicious CONTEXT structure creation attempt RuleID : 46905 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-10 | Microsoft Windows SYSTEM token stealing attempt RuleID : 46904 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-10 | Microsoft Windows SYSTEM token stealing attempt RuleID : 46903 - Revision : 2 - Type : INDICATOR-COMPROMISE |
2018-07-03 | Microsoft Windows kernel privilege escalation attempt RuleID : 46835 - Revision : 1 - Type : OS-WINDOWS |
2018-07-03 | Microsoft Windows kernel privilege escalation attempt RuleID : 46834 - Revision : 1 - Type : OS-WINDOWS |
2018-07-03 | Microsoft Windows ROP gadget locate attempt RuleID : 46833 - Revision : 1 - Type : OS-WINDOWS |
2018-07-03 | Microsoft Windows ROP gadget locate attempt RuleID : 46832 - Revision : 1 - Type : OS-WINDOWS |
2018-07-03 | Microsoft Windows kernel privilege escalation attempt RuleID : 46831 - Revision : 1 - Type : OS-WINDOWS |
2018-07-03 | Microsoft Windows kernel privilege escalation attempt RuleID : 46830 - Revision : 1 - Type : OS-WINDOWS |
Metasploit Database
id | Description |
---|---|
2018-05-08 | Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-a7ac26523d.nasl - Type : ACT_GATHER_INFO |
2018-11-13 | Name : The remote Debian host is missing a security update. File : debian_DLA-1577.nasl - Type : ACT_GATHER_INFO |
2018-11-02 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL17403481.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing multiple security updates. File : EulerOS_SA-2018-1270.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing multiple security updates. File : EulerOS_SA-2018-1263.nasl - Type : ACT_GATHER_INFO |
2018-08-17 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2018-1_0-0132-a.nasl - Type : ACT_GATHER_INFO |
2018-07-24 | Name : The remote PhotonOS host is missing multiple security updates. File : PhotonOS_PHSA-2018-2_0-0037-a.nasl - Type : ACT_GATHER_INFO |
2018-07-18 | Name : The remote Virtuozzo host is missing multiple security updates. File : Virtuozzo_VZA-2018-048.nasl - Type : ACT_GATHER_INFO |
2018-07-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-2164.nasl - Type : ACT_GATHER_INFO |
2018-06-05 | Name : The remote host is missing a macOS or Mac OS X security update that fixes mul... File : macosx_SecUpd2018-003.nasl - Type : ACT_GATHER_INFO |
2018-06-05 | Name : The remote host is missing a macOS update that fixes multiple security vulner... File : macos_10_13_5.nasl - Type : ACT_GATHER_INFO |
2018-06-05 | Name : The remote Debian host is missing a security update. File : debian_DLA-1392.nasl - Type : ACT_GATHER_INFO |
2018-05-31 | Name : The remote Virtuozzo host is missing multiple security updates. File : Virtuozzo_VZA-2018-037.nasl - Type : ACT_GATHER_INFO |
2018-05-31 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1318.nasl - Type : ACT_GATHER_INFO |
2018-05-30 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1023.nasl - Type : ACT_GATHER_INFO |
2018-05-30 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1023.nasl - Type : ACT_GATHER_INFO |
2018-05-29 | Name : The remote Fedora host is missing a security update. File : fedora_2018-7cd077ddd3.nasl - Type : ACT_GATHER_INFO |
2018-05-29 | Name : The remote Debian host is missing a security update. File : debian_DLA-1383.nasl - Type : ACT_GATHER_INFO |
2018-05-17 | Name : The remote Fedora host is missing a security update. File : fedora_2018-98684f429b.nasl - Type : ACT_GATHER_INFO |
2018-05-16 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4201.nasl - Type : ACT_GATHER_INFO |
2018-05-16 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1121.nasl - Type : ACT_GATHER_INFO |
2018-05-15 | Name : The remote Virtuozzo host is missing multiple security updates. File : Virtuozzo_VZA-2018-029.nasl - Type : ACT_GATHER_INFO |
2018-05-11 | Name : A server virtualization platform installed on the remote host is affected by ... File : citrix_xenserver_CTX234679.nasl - Type : ACT_GATHER_INFO |
2018-05-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4196.nasl - Type : ACT_GATHER_INFO |
2018-05-10 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-1319.nasl - Type : ACT_GATHER_INFO |
2018-05-09 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1119.nasl - Type : ACT_GATHER_INFO |
2018-05-09 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_521ce80452fd11e89123a4badb2f4699.nasl - Type : ACT_GATHER_INFO |
2018-05-09 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1120.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 13:23:19 |
|
2024-08-02 13:00:39 |
|
2024-08-02 01:17:15 |
|
2024-02-16 12:52:50 |
|
2024-02-15 01:55:14 |
|
2024-02-02 01:58:39 |
|
2024-02-01 12:16:16 |
|
2024-01-13 01:53:30 |
|
2023-09-05 12:56:35 |
|
2023-09-05 01:15:58 |
|
2023-09-02 12:55:52 |
|
2023-09-02 01:16:15 |
|
2023-08-12 12:59:41 |
|
2023-08-12 01:15:31 |
|
2023-08-11 12:53:37 |
|
2023-08-11 01:15:57 |
|
2023-08-06 12:52:02 |
|
2023-08-06 01:15:29 |
|
2023-08-04 12:52:16 |
|
2023-08-04 01:15:37 |
|
2023-07-14 12:52:16 |
|
2023-07-14 01:15:35 |
|
2023-03-29 01:53:39 |
|
2023-03-28 12:15:54 |
|
2022-12-15 12:42:55 |
|
2022-10-11 12:46:46 |
|
2022-10-11 01:15:33 |
|
2022-01-13 01:34:46 |
|
2022-01-06 01:34:52 |
|
2022-01-05 01:34:37 |
|
2021-06-10 01:29:36 |
|
2021-05-05 12:28:49 |
|
2021-05-04 13:21:02 |
|
2021-04-22 02:36:00 |
|
2020-05-23 13:17:11 |
|
2020-05-23 02:20:22 |
|
2020-05-23 01:19:34 |
|
2019-10-03 09:21:30 |
|
2019-01-04 00:19:05 |
|
2018-12-20 12:08:42 |
|
2018-12-01 00:19:04 |
|
2018-11-13 17:19:28 |
|
2018-10-17 12:08:42 |
|
2018-09-28 17:19:38 |
|
2018-07-28 09:19:24 |
|
2018-07-04 12:03:02 |
|
2018-06-20 17:19:16 |
|
2018-06-14 12:06:19 |
|
2018-06-03 09:19:44 |
|
2018-05-30 09:19:28 |
|
2018-05-27 09:19:19 |
|
2018-05-25 09:19:37 |
|
2018-05-19 09:19:09 |
|
2018-05-18 09:19:26 |
|
2018-05-17 09:19:39 |
|
2018-05-11 09:19:13 |
|
2018-05-10 09:19:39 |
|
2018-05-09 09:19:45 |
|
2018-05-09 00:19:16 |
|