漏洞信息详情
Modern DRAM 输入验证错误漏洞
漏洞简介
Modern DRAM是一款芯片。
Modern DRAM芯片中内部缓解措施(为防止RowHammer攻击)的部署存在输入验证错误漏洞。攻击者可利用该漏洞提升权限。以下产品及版本受到影响:SK Hynix DDR4 SDRAM;SK Hynix LPDDR4;Micron DDR4 SDRAM;Micron LPDDR4;Samsung DDR4 SDRAM;Samsung LPDDR4。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.vusec.net/projects/trrespass/
参考网址
来源:MISC
链接:https://thehackernews.com/2020/03/rowhammer-vulnerability-ddr4-dram.html
来源:MISC
链接:https://twitter.com/antumbral/status/1237425959407513600
来源:MISC
链接:https://download.vusec.net/papers/trrespass_sp20.pdf
来源:MISC
链接:https://github.com/vusec/trrespass
来源:MISC
链接:https://twitter.com/vu5ec/status/1237399112590467072
来源:MISC
链接:https://www.vusec.net/projects/trrespass/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-10255
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2020-10255
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/F5-BIG-IP-physical-memory-corruption-via-Rowhammer-32302
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1764/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/a-new-and-advanced-rowhammer-based-attack-on-ddr4-memory/
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...