search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Hardware debug exception documentation may result in unexpected behavior

Vulnerability Note VU#631579

Original Release Date: 2018-05-08 | Last Revised: 2018-06-06

Overview

In some circumstances, some operating systems or hypervisors may not expect or properly handle an Intel architecture hardware debug exception. The error appears to be due to developer interpretation of existing documentation for certain Intel architecture interrupt/exception instructions, namely MOV SS and POP SS.

Description

CWE-703: Improper Check or Handling of Exceptional Conditions - CVE-2018-8897

The MOV SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV SS or POP SS instruction itself). Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol 3A; section 2.3).

If the instruction following the MOV SS or POP SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at Current Privilege Level (CPL) < 3, a debug exception is delivered after the transfer to CPL < 3 is complete. Such deferred #DB exceptions by MOV SS and POP SS may result in unexpected behavior.

Therefore, in certain circumstances after the use of certain Intel x86-64 architecture instructions, a debug exception pointing to data in a lower ring (for most operating systems, the kernel Ring 0 level) is made available to operating system components running in Ring 3. This may allow an attacker to utilize operating system APIs to gain access to sensitive memory information or control low-level operating system functions.

Several operating systems appear to incorrectly handle this exception due to interpretation of potentially unclear existing documentation and guidance on the use of these instructions.

More details can be found in the researcher's paper.

Impact

An authenticated attacker may be able to read sensitive data in memory or control low-level operating system functions,

Solution

Apply an update

Check with your operating system or software vendor for updates to address this issue. There is no expected performance impact for applying an update. A list of affected vendors and currently-known updates is provided below.

Vendor Information

631579
 
Affected   Unknown   Unaffected

Apple

Notified:  May 01, 2018 Updated:  May 08, 2018

Statement Date:   May 08, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Apple has released a Security Update 2018-001 to address this issue.

Vendor References

https://support.apple.com/en-us/HT208742

Check Point Software Technologies

Notified:  May 01, 2018 Updated:  May 10, 2018

Statement Date:   May 10, 2018

Status

  Affected

Vendor Statement

Check Point sees these as non-exploitable, taking our business logic and best practices into consideration.

See details at SecureKnowledge sk126534.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk126534

DragonFly BSD Project

Notified:  May 01, 2018 Updated:  May 01, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

FreeBSD Project

Notified:  April 30, 2018 Updated:  May 07, 2018

Statement Date:   May 07, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

More information is available in the FreeBSD Security Advisory 18:06.

Vendor References

https://security.FreeBSD.org/advisories/FreeBSD-SA-18:06.debugreg.asc

Linux Kernel

Updated:  May 08, 2018

Statement Date:   May 08, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The issue was fixed upstream on March 23, with Linux "stable" branches was fixed shortly thereafter. Therefore the following kernels (or higher) contain the patch: 4.15.14, 4.14.31, 4.9.91, 4.4.125. The older 4.1, 3.16, and 3.2 branches are also affected.

Microsoft

Notified:  May 01, 2018 Updated:  May 01, 2018

Statement Date:   May 01, 2018

Status

  Affected

Vendor Statement

The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897

Red Hat, Inc.

Notified:  May 01, 2018 Updated:  May 08, 2018

Statement Date:   May 08, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Red Hat Enterprise Linux is affected. Please see the security advisory for more information.

Vendor References

https://access.redhat.com/security/vulnerabilities/pop_ss

Ubuntu

Notified:  May 01, 2018 Updated:  May 08, 2018

Statement Date:   May 08, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see Ubuntu Security Notices USN-3641-1 and USN-3641-2 for more details.

Vendor References

https://usn.ubuntu.com/3641-1/ https://usn.ubuntu.com/3641-2/

Ubuntu

Notified:  May 01, 2018 Updated:  May 01, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

VMware

Notified:  May 01, 2018 Updated:  May 07, 2018

Statement Date:   May 07, 2018

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

VMware has issued a statement about this vulnerability report. Please see the statement for full details.

Vendor References

https://kb.vmware.com/s/article/54988

Xen

Notified:  May 01, 2018 Updated:  May 01, 2018

Statement Date:   May 01, 2018

Status

  Affected

Vendor Statement

All versions of Xen are vulnerable. Only x86 systems are vulnerable.  ARM systems are not vulnerable.

Only x86 PV guests can exploit the vulnerability.  x86 HVM and PVH guests cannot exploit the vulnerability.

An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.
 

MITIGATION
==========

Running only HVM or PVH guests avoids the vulnerability.

Note however that a compromised device model (running in dom0 or a stub domain) can carry out this attack, so users with HVM domains are also advised to patch their systems.


RESOLUTION
==========
Applying the appropriate attached patch resolves this issue.

Vendor Information

For the full statement, please see Xen Advisory 260.

Vendor References

https://xenbits.xen.org/xsa/advisory-260.html

Brocade Communication Systems

Notified:  May 01, 2018 Updated:  May 30, 2018

Statement Date:   May 27, 2018

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Intel

Notified:  May 01, 2018 Updated:  May 09, 2018

Statement Date:   May 05, 2018

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

At this time, we are not aware of any Intel Products affected by CVE-2018-8897.

Vendor References

www.intel.com/sdm

Joyent

Notified:  May 01, 2018 Updated:  May 01, 2018

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

SmartOS does not allow access to the debug register outside of debug mode and so is not affected.

NetBSD

Notified:  May 01, 2018 Updated:  May 01, 2018

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

NetBSD does not support debug register and so is not affected.

OpenBSD

Notified:  May 01, 2018 Updated:  May 08, 2018

Statement Date:   May 08, 2018

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

QUALCOMM Incorporated

Notified:  May 01, 2018 Updated:  June 06, 2018

Statement Date:   June 05, 2018

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

ZyXEL

Notified:  May 01, 2018 Updated:  May 21, 2018

Statement Date:   May 14, 2018

Status

  Not Affected

Vendor Statement

No Zyxel products are vulnerable to unexpected operating system behavior resulting from an Intel architecture hardware debug exception, as reported in [CERT/CC] vulnerability note VU#631579 at https://www.kb.cert.org/vuls/id/631579.

Vendor Information

Zyxel has issued Zyxel-SA-1135-01 stating that no products are affected.

eero

Notified:  May 01, 2018 Updated:  May 08, 2018

Statement Date:   May 08, 2018

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

3com Inc

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

ACCESS

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

ADTRAN

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

ARRIS

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

ASP Linux

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

AT&T

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

AVM GmbH

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Actiontec

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

AirWatch

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Alcatel-Lucent Enterprise

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Appgate Network Security

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Arch Linux

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Arista Networks, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

AsusTek Computer Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Avaya, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Belkin, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

BlackBerry

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

BlueCat Networks, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Broadcom

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

CA Technologies

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Cambium Networks

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Cisco

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Command Software Systems

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

CoreOS

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

D-Link Systems, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Debian GNU/Linux

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Dell

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Dell EMC

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Deutsche Telekom

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Devicescape

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Digi International

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Espressif Systems

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Fedora Project

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Force10 Networks

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

GNU glibc

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Gentoo Linux

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Google

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

HP Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

HTC

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

HardenedBSD

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Hitachi

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Honeywell

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Huawei Technologies

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

IBM Corporation (zseries)

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

IBM eServer

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

IBM, INC.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

InfoExpress, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Infoblox

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Internet Systems Consortium

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Internet Systems Consortium - DHCP

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Interniche Technologies, inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Juniper Networks

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Lancope

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Lantronix

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Lenovo

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Linksys

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Marvell Semiconductors

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

McAfee

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

MediaTek

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

MetaSwitch

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Micro Focus

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Microchip Technology

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

MikroTik

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Miredo

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Mitel Networks, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

NETSCOUT

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Netgear, Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Nominum

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Oracle Corporation

Notified:  May 01, 2018 Updated:  May 07, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Oracle Solaris is not affected by CVE-2018-8897.

Peplink

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Philips Electronics

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

PowerDNS

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

QLogic

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

QNX Software Systems Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Quagga

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Quantenna Communications

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Roku

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Ruckus Wireless

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

SafeNet

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Samsung Mobile

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Secure64 Software Corporation

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Sierra Wireless

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Slackware Linux Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Snort

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Sonos

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Sony Corporation

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Sourcefire

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Symantec

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

TP-LINK

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Technicolor

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

TippingPoint Technologies Inc.

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Toshiba Commerce Solutions

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

TrueOS

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Turbolinux

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Ubiquiti Networks

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Unisys

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Wind River

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Zebra Technologies

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

ZyXEL

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

aep NETWORKS

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

dnsmasq

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

eCosCentric

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

m0n0wall

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

netsnmp

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

pfSENSE

Notified:  May 01, 2018 Updated:  April 30, 2018

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.3 E:POC/RL:OF/RC:C
Environmental 5.3 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Credit

Microsoft and Intel credit Nick Peterson of Everdox Tech, LLC for responsibly reporting this vulnerability and working with the group on coordinated disclosure. Andy Lutomirski is also credited for assistance in documenting the vulnerability for Linux.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2018-8897
Date Public: 2018-05-08
Date First Published: 2018-05-08
Date Last Updated: 2018-06-06 18:17 UTC
Document Revision: 105

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.