Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5754 PoC — Intel和ARM CPU芯片信息泄露漏洞

Source
Associated Vulnerability
Title:Intel和ARM CPU芯片信息泄露漏洞 (CVE-2017-5754)
Description:Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Description
Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances
Readme
# meltdown-aws-scanner #
Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances

# Requirements #
* aws cli with working configuration

# Using the script #
## Scan all EC2 instances in default account and region ##
    $ ./check_meltdown.sh | tee $(date '+%Y-%m-%d').csv
## Scan a subset of EC2 instances in default account and region ##
    $ ./check_meltdown.sh --filters "Name=tag:Name,Values=prod-*"
File Snapshot

[4.0K] /data/pocs/a2ac39321cb1e440d64c1d57bc0cb3079f678aac ├── [1.9K] meltdown-aws-scanner.sh └── [ 434] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →