CVE-2015-0565
NaCl vulnerability analysis and mitigation

Overview

CVE-2015-0565 is a security vulnerability discovered in Native Client (NaCl) in 2015 that allowed the CLFLUSH instruction to be used, making rowhammer attacks possible. The vulnerability was disclosed in March 2015 and affected NaCl's x86-64 sandbox implementation (Project Zero).

Technical details

The vulnerability stems from NaCl allowing the use of the x86 CLFLUSH instruction, which can be used to force memory accesses to be sent directly to the underlying DRAM, bypassing the CPU cache. This capability enables rowhammer attacks, where repeated access to specific memory locations can cause bit flips in adjacent memory rows. The vulnerability has a CVSS v3.1 base score of 10.0 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) (NVD).

Impact

The vulnerability could allow an attacker to escape from NaCl's x86-64 sandbox and gain the ability to call the host OS's syscalls directly. In a more severe scenario, when combined with other techniques, it could potentially enable privilege escalation to gain kernel-level access (Project Zero).

Mitigation and workarounds

The vulnerability was mitigated by changing NaCl's x86 validator to disallow the CLFLUSH instruction. This change prevents the rowhammer attack vector from being exploited through NaCl (Project Zero).

Additional resources


SourceThis report was generated using AI

Related NaCl vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2015-0565CRITICAL10
  • NaClNaCl
  • nacl
NoNoFeb 25, 2020

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management