支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: f0a7e64caf3bc63938bdc1162907411777a1ea9f

来源
关联漏洞
标题:AMD、ARM和Intel CPUs 信息泄露漏洞 (CVE-2018-3639)
Description:AMD、ARM和Intel CPUs等都是不通厂商的CPU(中央处理器)产品。 AMD、ARM和Intel CPUs存在信息泄露漏洞。攻击者可通过实施边信道攻击利用该漏洞获取信息。
Description
Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux
介绍
# CVE-2018-3639
Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux

## Download
```sh
git clone git@github.com:mmxsrup/CVE-2018-3639.git
```

## Build
```sh
cd CVE-2018-3639
make
```

## Run
```sh
./specter
```

## Output
```txt
$ ./spectre 
idx: 0, highest:P, hitrate:21.340000
idx: 1, highest:A, hitrate:15.520000
idx: 2, highest:S, hitrate:13.600000
idx: 3, highest:S, hitrate:18.650000
idx: 4, highest:W, hitrate:19.860000
idx: 5, highest:O, hitrate:15.350000
idx: 6, highest:R, hitrate:17.470000
idx: 7, highest:D, hitrate:18.680000
idx: 8, highest:_, hitrate:15.580000
idx: 9, highest:S, hitrate:14.480000
idx:10, highest:P, hitrate:17.870000
idx:11, highest:E, hitrate:13.300000
idx:12, highest:C, hitrate:14.360000
idx:13, highest:T, hitrate:18.030000
idx:14, highest:R, hitrate:18.460000
idx:15, highest:E, hitrate:13.230000
PASSWORD_SPECTRE
```

## References
- [speculative execution, variant 4: speculative store bypass](https://bugs.chromium.org/p/project-zero/issues/detail?id=1528)  
- [Analysis and mitigation of speculative store bypass (CVE-2018-3639)](https://blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/)  
- [Kernel Side-Channel Attack using Speculative Store Bypass - CVE-2018-3639](https://access.redhat.com/security/vulnerabilities/ssbd)  
- [Spectre V4: Store-Load Vulnerability](https://www.cyberus-technology.de/posts/2018-05-22-intel-store-load-spectre-vulnerability.html)  
文件快照

[4.0K] /data/pocs/f0a7e64caf3bc63938bdc1162907411777a1ea9f ├── [1.0K] LICENSE ├── [ 174] Makefile ├── [1.5K] README.md └── [1.8K] spectre.c 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。