Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern ARM processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.vusec.net/projects/anc | Exploit Technical Description Third Party Advisory | 
| http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf | Exploit Technical Description Third Party Advisory | 
| http://www.securityfocus.com/bid/96459 | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2017-02-26 23:59
Updated : 2017-03-01 18:59
NVD link : CVE-2017-5927
Mitre link : CVE-2017-5927
JSON object : View
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
                intel
- core_i7-4500u
 - core_i5_m480
 - xeon_e5-2658_v2
 - core_i7-6700k
 - core_i7_920
 - core_i7-2620qm
 - core_i7-3632qm
 - atom_c2750
 - celeron_n2840
 - xeon_e3-1240_v5
 
nvidia
- tegra_k1_cd570m-a1
 - tegra_k1_cd580m-a1
 
samsung
- exynos_5800
 
amd
- phenom_9550_4-core
 - fx-8320_8-core
 - e-350
 - fx-8350_8-core
 - athlon_ii_640_x4
 - fx-8120_8-core
 
allwinner
- a64
 


