Executive Summary

Title Row Hammer Privilege Escalation Vulnerability
Name cisco-sa-20150309-rowhammer First vendor Publication 2015-03-09
Vendor Cisco Last vendor Modification 2015-03-09
Severity (Vendor) N/A Revision 1.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score Not Defined Attack Range Not Defined
Cvss Impact Score Not Defined Attack Complexity Not Defined
Cvss Expoit Score Not Defined Authentication Not Defined
Calculate full CVSS 2.0 Vectors scores


On March 9, 2015, new research was published that takes advantage of a flaw in double data rate type 3 (DDR3) synchronous dynamic random-access memory (SDRAM) to perform privilege escalation attacks on systems that contain the affected hardware. The flaw is known as Row Hammer. To attempt an attack, the attacker must execute a malicious binary on an affected system.

In addition, the research focused on consumer hardware that did not have a number of mitigations and memory protections that have been integrated into chipsets and memory modules used in Cisco server-class products. Of note in the paper is that the researchers were unable, in their testing, to exploit devices that use Error-Correcting Code (ECC) memory.

Cisco offers a limited number of products that allow an unprivileged user to load and execute binaries.

The research report is at the following link: http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150309-rowhammer

BEGIN PGP SIGNATURE Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org

iQIcBAEBAgAGBQJU/iy6AAoJEIpI1I6i1Mx31p8P/iIzjc8+zRto+D2K2JnqXQzG SPIKgEX8+4Fn8nk6bqh83SOBToU68PqhZHbvghuDaaM6F/8AcuWUiexesCMALfYF Qr3mle3aH2R7pTRrN4P3kLRXjlTRsaLFe7mU4zAuy3Tev0MPlmskhPzJEzbdiOjy wpGa3BT2lB2CP3tf84b/WwAYB/2zEZapAkTM1sQoq5hebdoy3bT0sUaQfAgyKfx5 TMjT/fdJlHC1Xp7NW1g80p9OOUw69g+P9xntxdA1t9pj2MBVdPwf27Zd3kNYWw+d rZH7pbP6//41qjYM5ox7ajdCz3jkRLz7d8O1rstsAZgmNB2Yx+rW9vtsBPiS9yWf OmpLnt0YAA0emYmbvp+DOFduAq68+CxpliFFSlDDJVy9bXtoDMDQ6sMXYzHOFBH4 IfJ0LPW1V/8HWupvKAUCDsnx2psh8n4+6cp9NKGjgiIEHFk93kHDgTWtXG9Dscsy zzvbmO+yYLNK+3r6lOCi2vJJ0ZZuEyDWKoCKKHVZZQ24F4IlkYeSt4Ybb1ssQjI5 k4AzrpTLjS0uVzrrABxTRUVxXTEipnYBcdQRPUviBL67cCREXLniJuAAQlj3r4KN OPjFf18ijnRAslSxYfwZ3Zgs8SOOikCjggCVqQ3jbUE7rT86oxUsOMZZt1RVDiOp tyyfg/et0F7D6BB9a7Fu =Zts4 END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

Alert History

If you want to see full details history, please login or register.
Date Informations
2015-03-10 05:22:12
  • First insertion