CVE-2018-3639
Published at:
-
22-05-2018 02:29
Last modified:
-
22-11-2022 05:52
Total changes:
-
7
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Local
Attack vector
None
Availability
High
Confidentiality
None
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
5.5
Base score
1.8
3.6
Exploitability score
Impact score
Verification logic
Reference
- TA18-141A-Third Party Advisory, US Government Resource
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
- https://www.synology.com/support/security/Synology_SA_18_23
- VU#180049-Third Party Advisory, US Government Resource
- USN-3655-2-Third Party Advisory
- USN-3654-2-Third Party Advisory
- USN-3654-1-Third Party Advisory
- USN-3653-2-Third Party Advisory
- USN-3653-1-Third Party Advisory
- USN-3652-1-Third Party Advisory
- USN-3651-1-Third Party Advisory
- 20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018-Third Party Advisory
- https://support.citrix.com/article/CTX235225
- https://security.netapp.com/advisory/ntap-20180521-0001/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
- RHSA-2018:1660-Third Party Advisory
- RHSA-2018:1655-Third Party Advisory
- RHSA-2018:1647-Third Party Advisory
- RHSA-2018:1630-Third Party Advisory
- http://xenbits.xen.org/xsa/advisory-263.html
- 1040949-Third Party Advisory, VDB Entry
- http://support.lenovo.com/us/en/solutions/LEN-22133
- RHSA-2018:1690-Third Party Advisory
- RHSA-2018:1689-Third Party Advisory
- RHSA-2018:1688-Third Party Advisory
- RHSA-2018:1686-Third Party Advisory
- RHSA-2018:1676-Third Party Advisory
- RHSA-2018:1675-Third Party Advisory
- RHSA-2018:1674-Third Party Advisory
- RHSA-2018:1669-Third Party Advisory
- RHSA-2018:1668-Third Party Advisory
- RHSA-2018:1667-Third Party Advisory
- RHSA-2018:1666-Third Party Advisory
- RHSA-2018:1665-Third Party Advisory
- RHSA-2018:1664-Third Party Advisory
- RHSA-2018:1663-Third Party Advisory
- RHSA-2018:1662-Third Party Advisory
- RHSA-2018:1661-Third Party Advisory
- RHSA-2018:1659-Third Party Advisory
- RHSA-2018:1658-Third Party Advisory
- RHSA-2018:1657-Third Party Advisory
- RHSA-2018:1656-Third Party Advisory
- RHSA-2018:1654-Third Party Advisory
- RHSA-2018:1653-Third Party Advisory
- RHSA-2018:1652-Third Party Advisory
- RHSA-2018:1651-Third Party Advisory
- RHSA-2018:1650-Third Party Advisory
- RHSA-2018:1649-Third Party Advisory
- RHSA-2018:1648-Third Party Advisory
- RHSA-2018:1646-Third Party Advisory
- RHSA-2018:1645-Third Party Advisory
- RHSA-2018:1644-Third Party Advisory
- RHSA-2018:1643-Third Party Advisory
- RHSA-2018:1642-Third Party Advisory
- RHSA-2018:1636-Third Party Advisory
- RHSA-2018:1635-Third Party Advisory
- RHSA-2018:1633-Third Party Advisory
- RHSA-2018:1632-Third Party Advisory
- RHSA-2018:1629-Third Party Advisory
- 104232-Third Party Advisory, VDB Entry
- 44695-Exploit, Third Party Advisory, VDB Entry
- RHSA-2018:1711-Third Party Advisory
- RHSA-2018:1710-Third Party Advisory
- RHSA-2018:1696-Third Party Advisory
- DSA-4210-Third Party Advisory
- USN-3655-1-Third Party Advisory
- RHSA-2018:1738-Third Party Advisory
- RHSA-2018:1737-Third Party Advisory
- RHSA-2018:1641-Third Party Advisory
- RHSA-2018:1640-Third Party Advisory
- RHSA-2018:1639-Third Party Advisory
- RHSA-2018:1638-Third Party Advisory
- RHSA-2018:1637-Third Party Advisory
- http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
- USN-3680-1-Third Party Advisory
- USN-3679-1-Third Party Advisory
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
- RHSA-2018:1826-Third Party Advisory
- RHSA-2018:1854-Third Party Advisory
- RHSA-2018:2006-Third Party Advisory
- RHSA-2018:2003-Third Party Advisory
- RHSA-2018:2001-Third Party Advisory
- RHSA-2018:1997-Third Party Advisory
- RHSA-2018:1967-Third Party Advisory
- RHSA-2018:1965-Third Party Advisory
- RHSA-2018:2060-Third Party Advisory
- RHSA-2018:2164-Third Party Advisory
- RHSA-2018:2162-Third Party Advisory
- RHSA-2018:2161-Third Party Advisory
- RHSA-2018:2172-Third Party Advisory
- RHSA-2018:2171-Third Party Advisory
- RHSA-2018:2216-Third Party Advisory
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package-Mailing List, Third Party Advisory
- RHSA-2018:2228-Third Party Advisory
- RHSA-2018:2250-Third Party Advisory
- RHSA-2018:2246-Third Party Advisory
- RHSA-2018:2258-Third Party Advisory
- [debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update-Mailing List, Third Party Advisory
- RHSA-2018:2289-Third Party Advisory
- RHSA-2018:2328-Third Party Advisory
- RHSA-2018:2309-Third Party Advisory
- RHSA-2018:2364-Third Party Advisory
- RHSA-2018:2363-Third Party Advisory
- RHSA-2018:2396-Third Party Advisory
- RHSA-2018:2394-Third Party Advisory
- RHSA-2018:2387-Third Party Advisory
- DSA-4273-Third Party Advisory
- USN-3756-1-Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
- [debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update-Mailing List, Third Party Advisory
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
- USN-3777-3-Third Party Advisory
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
- RHSA-2018:3425-Third Party Advisory
- RHSA-2018:3424-Third Party Advisory
- RHSA-2018:3423-Third Party Advisory
- RHSA-2018:3407-Third Party Advisory
- RHSA-2018:3402-Third Party Advisory
- RHSA-2018:3401-Third Party Advisory
- RHSA-2018:3400-Third Party Advisory
- RHSA-2018:3399-Third Party Advisory
- RHSA-2018:3398-Third Party Advisory
- RHSA-2018:3397-Third Party Advisory
- RHSA-2018:3396-Third Party Advisory
- RHSA-2018:2948-Third Party Advisory
- 1042004-Third Party Advisory, VDB Entry
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- RHSA-2019:0148-Broken Link
- https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update-Mailing List, Third Party Advisory
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update-Mailing List, Third Party Advisory
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update-Mailing List, Third Party Advisory
- https://nvidia.custhelp.com/app/answers/detail/a_id/4787
- https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
- RHSA-2019:1046-Third Party Advisory
- openSUSE-SU-2019:1439-Broken Link
- openSUSE-SU-2019:1438-Broken Link
- 20190624 [SECURITY] [DSA 4469-1] libvirt security update-Issue Tracking, Mailing List, Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- [oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768-Mailing List, Third Party Advisory
- [oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768-Mailing List, Third Party Advisory
- [oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768-Mailing List, Third Party Advisory
- https://www.oracle.com/security-alerts/cpujul2020.html
- openSUSE-SU-2020:1325-Broken Link
Keywords