结构: Simple
Abstraction: Base
状态: Incomplete
被利用可能性: Low
The developer builds a security-critical protection mechanism into the software, but the processor optimizes the execution of the program such that the mechanism is removed or modified.
cwe_Nature: ChildOf cwe_CWE_ID: 1038 cwe_View_ID: 699 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 1038 cwe_View_ID: 1000 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Rarely'}
范围 | 影响 | 注释 |
---|---|---|
Integrity | Bypass Protection Mechanism | A successful exploitation of this weakness will change the order of an application's execution and will likely be used to bypass specific protection mechanisms. This bypass can be exploited further to potentially read data that should otherwise be unaccessible. |
Although the mentioned detection method is theoretically possible, the use of speculative execution is a preferred way of increasing processor performance. The reality is that a large number of statements are executed out of order, and determining if any of them break an access control property would be extremely opportunistic.
标识 | 说明 | 链接 |
---|---|---|
CVE-2017-5715 | Intel, ARM, and AMD processor optimizations related to speculative execution and branch prediction cause access control checks to be bypassed when placing data into the cache. Often known as "Spectre". | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715 |
CVE-2017-5753 | Intel, ARM, and AMD processor optimizations related to speculative execution and branch prediction cause access control checks to be bypassed when placing data into the cache. Often known as "Spectre". | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753 |
CVE-2017-5754 | Intel processor optimizations related to speculative execution cause access control checks to be bypassed when placing data into the cache. Often known as "Meltdown". | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 |