Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5753 PoC — Intel和ARM CPU芯片信息泄露漏洞

Source
Associated Vulnerability
Title:Intel和ARM CPU芯片信息泄露漏洞 (CVE-2017-5753)
Description:Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Description
OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output
Readme
# CVE-2017-5753
CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch

Compile:
gcc -o a.out spectre.c

Output: 0x41414141

Also added Control Flow output from Hopper.app for Visual Learners

You can Adjust the junk size and get more reliable Reads

Depending on CPU activity, Hits are lower when Activity is High on older Devices with small Cache
File Snapshot

[4.0K] /data/pocs/d7704d27ffae654fdae198b310449921853f2bb2 ├── [4.3K] annotation-20180105111900.json ├── [ 355] README.md ├── [ 16K] spectre.asm ├── [4.4K] spectre.c ├── [ 39K] spectre-control-flow-layout-osx.pdf ├── [3.3K] spectre-osx-output-sample-internet-poc.txt └── [2.3K] spectre-osx-output-sample.txt 0 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →