Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0551 PoC — 多款Intel产品注入漏洞

Source
Associated Vulnerability
Title:多款Intel产品注入漏洞 (CVE-2020-0551)
Description:Intel Core i5 processor和Intel Core i7 processor都是美国英特尔(Intel)公司的产品。Intel Core i5 processor是一款酷睿(Core)i5系列中央处理器(CPU)。Intel Core i7 processor是一款酷睿(Core)i7系列中央处理器(CPU)。 多款Intel产品中预测执行技术的使用存在安全漏洞。本地攻击者可利用该漏洞获取信息。以下产品及版本受到影响:Intel Core Processor i7-10510Y,Core
Description
This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)
Readme
# PoC for the LVI-LFB Control Flow Hijacking attack ([CVE-2020-0551](https://nvd.nist.gov/vuln/detail/CVE-2020-0551))

This repository holds the sources for the LVI-LFB Control Flow Hijacking attack PoC.

## Contents

* lvi-cfh-poc - hijack the control flow of another process via line-fill buffer spraying
* whitepaper

## Prerequisites

1. Visual Studio 2015
2. A vulnerable Intel CPU

## Authors

* Andrei Vlad LUȚAȘ
* Dan Horea LUȚAȘ

## Additional resources

* Bitdefender blog post: https://businessinsights.bitdefender.com/bitdefender-researchers-discover-new-side-channel-attack
* Official LVI web-site - https://lviattack.eu
* Intel Security Advisory - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
* Intel Deep Dive - https://software.intel.com/security-software-guidance/insights/deep-dive-load-value-injection
File Snapshot

[4.0K] /data/pocs/50b1d97e117b62893dc192dbf01c88c046aeefaf ├── [4.0K] doc │   └── [4.5M] Bitdefender_Whitepaper_LVI-LFB_EN.pdf ├── [1.4K] LICENSE ├── [ 865] README.md └── [4.0K] src ├── [4.0K] lvi_cfh_poc │   ├── [3.1K] asmhelper.asm │   ├── [4.3K] lvi_cfh_poc.c │   ├── [7.5K] lvi_cfh_poc.vcxproj │   └── [1.0K] lvi_cfh_poc.vcxproj.filters └── [1.3K] lvi_cfh_poc.sln 3 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.