{"uuid": "5fed61a6-8847-49ee-a3a5-52d9e825554d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-5754", "type": "exploited", "source": "https://t.me/alexmakus/1614", "content": "\u041f\u043e\u0445\u043e\u0436\u0435, \u0447\u0442\u043e Meltdown \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d \u0432 macOS X 10.12 \u0438 10.11 \nhttps://support.apple.com/en-gb/HT208331\n\nKernel\nAvailable for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6\nImpact: An application may be able to read kernel memory\nDescription: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.\nCVE-2017-5754: Jann Horn of Google Project Zero, Werner Haas and Thomas Prescher of Cyberus Technology GmbH, and Daniel Gruss, Moritz Lipp, Stefan Mangard and Michael Schwarz from Graz University of Technology\nEntry added January 4, 2018", "creation_timestamp": "2018-01-05T14:18:35.000000Z"}