Total meltdown source code released late last week of March 2018 by Microsoft for CVE 2018-1038, which in turn was supposed to patch up for the vulnerability.
To know more about this patch and in case you haven’t yet patched it, visit this link.
Total Meltdown Exploit was originally created from a botched patch Microsoft issued for the original Meltdown flaw–of the Spectre/Meltdown fame. Whereas the original Meltdown flaw was read-only, Total Meltdown provided write access. The source code for the Total-Meltdown Exploit is available on GitHub and the write-up for the same is available over here.
Total-Meltdown affects only 64-bit versions of Win7 and Windows Server 2008 R2 and was introduced by the following patches
- KB 4056894
- KB 4056897
- KB 4073578
- KB 4057400
- KB 4074598
- KB 4074587
- KB 4075211
- KB 4091290
- KB 4088875
- KB 4088878
- KB 4088881
Organizations, using 64Bit Versions of Win7 and Windows 2008 Server R2 should immediately apply the patch as mentioned in our earlier blog-post.
Read More – eScan Blog