Vulnerability Description
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 1.1.5.1 |
| Redhat | Enterprise Linux | 2.1 |
| Redhat | Enterprise Linux Desktop | 3.0 |
| Redhat | Fedora Core | core_3.0 |
| Sco | Openserver | 5.0.7 |
| Sco | Unixware | 7.1.3 |
| Sun | Solaris | 7.0 |
| Ubuntu | Ubuntu Linux | 4.1 |
References
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txtThird Party Advisory
- http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2Mailing List
- http://marc.info/?l=freebsd-security&m=110994370429609&w=2Mailing List
- http://marc.info/?l=openbsd-misc&m=110995101417256&w=2Mailing List
- http://secunia.com/advisories/15348Permissions Required
- http://secunia.com/advisories/18165Permissions Required
- http://securitytracker.com/id?1013967PatchThird Party AdvisoryVDB Entry
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1Vendor Advisory
- http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754Broken Link
- http://www.daemonology.net/hyperthreading-considered-harmful/Third Party Advisory
- http://www.daemonology.net/papers/htt.pdfThird Party Advisory
- http://www.kb.cert.org/vuls/id/911878Third Party AdvisoryUS Government Resource
- http://www.redhat.com/support/errata/RHSA-2005-476.htmlNot Applicable
- http://www.redhat.com/support/errata/RHSA-2005-800.htmlNot Applicable
- http://www.securityfocus.com/bid/12724PatchThird Party AdvisoryVDB Entry
FAQ
What is CVE-2005-0109?
CVE-2005-0109 is a vulnerability with a CVSS score of 5.6 (MEDIUM). Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, m...
How severe is CVE-2005-0109?
CVE-2005-0109 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0109?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Fedora Core, Sco Openserver.