CVE-2018-8897 (CNNVD-201805-208)

HIGH 有利用代码
中文标题:
多个厂商的操作系统竞争条件问题漏洞
英文标题:
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Develop...
CVSS分数: 7.8
发布时间: 2018-05-08 18:00:00
漏洞类型: 竞争条件问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v5
漏洞描述
中文描述:

Linux kernel是美国等都是美国Linux(Linux)基金会的产品。Linux kernel是开源操作系统Linux所使用的内核。Qualcomm Kernel等都是美国高通(Qualcomm)公司的产品。Qualcomm Kernel是一个使用在高通产品中的内核组件。Apple Kernel等都是美国苹果(Apple)公司的产品。Apple Kernel是Apple设备的内核。 多个厂商的操作系统中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。以下产品及版本受到影响:Linux(debian)7.0版本,8.0版本,9.0版本;Enterprise Linux Server 7.0版本;Enterprise Linux Workstation 7.0版本;Enterprise Virtualization Manager 3.0版本;Xenserver 6.0.2版本,6.2.0版本,6.5版本,7.0版本,7.1版本,7.2版本,7.3版本,7.4版本;Synology Skynas;Diskstation Manager 5.2版本,6.0版本,6.1版本;macOS 10.13.4之前版本;Xen;FreeBSD 11.0版本及之后版本(11.1版本已修复)。

英文描述:

A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.

CWE类型:
CWE-362
标签:
local windows Can Bölük Metasploit
受影响产品
厂商 产品 版本 版本范围 平台 CPE
debian debian_linux 7.0 - - cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
debian debian_linux 8.0 - - cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
canonical ubuntu_linux 14.04 - - cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 16.04 - - cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 17.10 - - cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
redhat enterprise_linux_server 7.0 - - cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 7.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
redhat enterprise_virtualization_manager 3.0 - - cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*
citrix xenserver 6.0.2 - - cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*
citrix xenserver 6.2.0 - - cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*
citrix xenserver 6.5 - - cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*
citrix xenserver 7.0 - - cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*
citrix xenserver 7.1 - - cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*
citrix xenserver 7.2 - - cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*
citrix xenserver 7.3 - - cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*
citrix xenserver 7.4 - - cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*
synology skynas - - - cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
synology diskstation_manager 5.2 - - cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*
synology diskstation_manager 6.0 - - cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*
synology diskstation_manager 6.1 - - cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*
apple mac_os_x * - - cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
xen xen - - - cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*
freebsd freebsd * - - cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
1040849 vdb-entry
cve.org
访问
104071 vdb-entry
cve.org
访问
RHSA-2018:1350 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
RHSA-2018:1347 vendor-advisory
cve.org
访问
44697 exploit
cve.org
访问
[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update mailing-list
cve.org
访问
1040866 vdb-entry
cve.org
访问
[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update mailing-list
cve.org
访问
[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2018:1346 vendor-advisory
cve.org
访问
RHSA-2018:1348 vendor-advisory
cve.org
访问
RHSA-2018:1354 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
DSA-4196 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
1040744 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2018:1351 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2018:1319 vendor-advisory
cve.org
访问
DSA-4201 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
RHSA-2018:1355 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
RHSA-2018:1345 vendor-advisory
cve.org
访问
45024 exploit
cve.org
访问
RHSA-2018:1349 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
RHSA-2018:1352 vendor-advisory
cve.org
访问
RHSA-2018:1318 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
VU#631579 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2018:1524 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
1040861 vdb-entry
cve.org
访问
RHSA-2018:1353 vendor-advisory
cve.org
访问
USN-3641-2 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
1040882 vdb-entry
cve.org
访问
USN-3641-1 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
ExploitDB EDB-44697 EXPLOIT
exploitdb
访问
Download Exploit EDB-44697 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2018-8897 ADVISORY
cve.org
访问
ExploitDB EDB-45024 EXPLOIT
exploitdb
访问
Download Exploit EDB-45024 EXPLOIT
exploitdb
访问
CVSS评分详情
7.8
HIGH
CVSS向量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS版本: 3.0
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2018-05-08 18:00:00
修改时间:
2024-08-05 07:10:46
创建时间:
2025-11-11 15:35:23
更新时间:
2025-11-11 16:47:50
利用信息
此漏洞有可利用代码!
利用代码数量: 2
利用来源:
未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-8897 2025-11-11 15:19:55 2025-11-11 07:35:23
NVD nvd_CVE-2018-8897 2025-11-11 14:55:54 2025-11-11 07:43:57
CNNVD cnnvd_CNNVD-201805-208 2025-11-11 15:10:01 2025-11-11 07:53:44
EXPLOITDB exploitdb_EDB-44697 2025-11-11 15:05:53 2025-11-11 08:47:20
EXPLOITDB exploitdb_EDB-45024 2025-11-11 15:05:53 2025-11-11 08:47:50
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5 EXPLOITDB
2025-11-11 16:47:50
references_count: 51 → 53; tags_count: 3 → 4
查看详细变更
  • references_count: 51 -> 53
  • tags_count: 3 -> 4
v4 EXPLOITDB
2025-11-11 16:47:20
references_count: 48 → 51; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 48 -> 51
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:53:44
vulnerability_type: 未提取 → 竞争条件问题; cnnvd_id: 未提取 → CNNVD-201805-208; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 竞争条件问题
  • cnnvd_id: 未提取 -> CNNVD-201805-208
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:57
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.8; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 24; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.8
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 24
  • data_sources: ['cve'] -> ['cve', 'nvd']