Lucene search

K
kasperskyKaspersky LabKLA11291
HistoryJun 13, 2018 - 12:00 a.m.

KLA11291 Microsoft Guidance for Lazy Floating Point State Restore

2018-06-1300:00:00
Kaspersky Lab
threats.kaspersky.com
81

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

32.1%

Speculative store bypass vulnerability in Microsoft Windows systems can be exploited to bypass security restrictions.

On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre and Meltdown) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees.

On June 13, 2018, an additional vulnerability involving side channel speculative execution, known as Lazy FP State Restore, has been announced and assigned CVE-2018-3665.

Original advisories

ADV180016

Related products

Microsoft-Windows

Microsoft-Windows-Server

CVE list

KB list

4338824

4338830

4338820

4338815

4338829

4338816

4345455

4338831

4345424

4345425

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Affected Products

  • Windows Server 2012 R2 (Server Core installation)Windows 10 for x64-based SystemsWindows 8.1 for x64-based systemsWindows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2012 R2

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

32.1%