- Mensajes: 1217
- Gracias recibidas: 48
Nueva Noticia rapida.. si.. es intel de nuevo.. y si, otra vulnerabilidad
- Tamalero
-
Autor del tema
- Desconectado
- Navegador Platino
-
Lo mas chistoso? Esta vulnerabilidad es expuesta gracias a un parche en microcode y en hardware de Cofee Lake y Ice Lake.
Tan feo que hasta intel recomienda quitar completamente el hyperthreading.
The leading attack in this new vulnerability class is a security flaw named Zombieload, which is another side-channel attack in the same category as Meltdown, Spectre, and Foreshadow. Just like the first three, Zombieload is exploited by taking advantage of the speculative execution process, which is an optimization technique that Intel added to its CPUs to improve data processing speeds and performance. For more than a year, academics have been poking holes in various components of the speculative execution process, revealing ways to leak data from various CPU buffer zones and data processing operations. Meltdown, Spectre, and Foreshadow have shown how various CPU components leak data during the speculative execution process.
Today, an international team of academics -- including some of the people involved in the original Meltdown and Spectre research -- along with security researchers from Bitdefender have disclosed a new attack impacting the speculative execution process. This one is what researchers have named a Microarchitectural Data Sampling (MDS) attack, and targets a CPU's microarchitectural data structures, such as the load, store, and line fill buffers, which the CPU uses for fast reads/writes of data being processed inside the CPU. [...] In a research paper published today, academics say that all Intel CPUs released since 2011 are most likely vulnerable. Processors for desktops, laptops, and (cloud) servers are all impacted, researchers said on a special website they've set up with information about the Zombieload flaws.
The Microarchitectural Data Sampling (MDS) issue is a speculative execution side-channel attack that may allow malicious actors to locally execute code in order to extract sensitive data that would otherwise by protected by Intel processors’ architectural mechanisms.
According to Intel, four CVEs were assigned to this flaw in Intel’s processors, including:
CVE-2018-12126 Microarchitectural Store Buffer Data Sampling (MSBDS)
CVE-2018-12130 Microarchitectural Fill Buffer Data Sampling (MFBDS)
CVE-2018-12127 Microarchitectural Load Port Data Sampling (MLPDS)
CVE-2019-11091 Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
En estas vulnerabilidades, todos los chips hasta NEHALEM son afectados.
Los únicos no afectados serian Whiskey Lake y la tecnología ATOM y Knight.
“ZombieLoad,” as it’s called, is a side-channel attack targeting Intel chips, allowing hackers to effectively exploit design flaws rather than injecting malicious code. Intel said ZombieLoad is made up of four bugs, which the researchers reported to the chip maker just a month ago.
Almost every computer with an Intel chips dating back to 2011 are affected by the vulnerabilities. AMD and ARM chips are not said to be vulnerable like earlier side-channel attacks.
ZombieLoad takes its name from a “zombie load,” an amount of data that the processor can’t understand or properly process, forcing the processor to ask for help from the processor’s microcode to prevent a crash. Apps are usually only able to see their own data, but this bug allows that data to bleed across those boundary walls. ZombieLoad will leak any data currently loaded by the processor’s core, the researchers said. Intel said patches to the microcode will help clear the processor’s buffers, preventing data from being read.
Like Meltdown and Spectre, it’s not just PCs and laptops affected by ZombieLoad — the cloud is also vulnerable. ZombieLoad can be triggered in virtual machines, which are meant to be isolated from other virtual systems and their host device.
techcrunch.com/2019/05/14/zombieload-flaw-intel-processors/
www.tomshardware.co.uk/intel-disable-hyper-threading-spectre-attack,news-60647.html3
tech.slashdot.org/story/19/05/14/1721242/intel-cpus-released-in-last-8-years-impacted-by-new-zombieload-side-channel-attack
Por favor, Conectar o Crear cuenta para unirse a la conversación.
- Tamalero
-
Autor del tema
- Desconectado
- Navegador Platino
-
- Mensajes: 1217
- Gracias recibidas: 48
Escondiendo la parte sucia mediante un sistema de "recompensa por encontrar X bug" con leyes muy limitantes.
Researchers from the VU University Amsterdam have found an extensive data breach that is present in all Intel processors. These chips are in more than 80 percent of all computers and servers.
On Tuesday evening, Intel and VU announced the details of RIDL (Rogue In-Flight Data Load), a vulnerability that allows malicious parties to "steal almost all data" from computers. Unauthorized persons can view the data that the processor is currently processing.
The vulnerability is in all Intel processors of the last ten years - including the very latest. Hackers can exploit the vulnerability by hiding code in a web advertisement.
Uno de las vulnerabilidades mas criticas permite obtener contraseñas originales.
www.reddit.com/r/AMD_Stock/comments/bos1pw/intel_tried_to_bribe_vu_university_amsterdam_into/One of those tricks: by logging in with an incorrect password, the attacker forces the computer to compare the wrong password with the correct password. This data runs through the 'pipelines' of the chip and can be intercepted, after which the hacker can retrieve the correct password after some tinkering. "You find fragments. As if you are going to get a paper document through the shredder and then reassemble the shreds, ”says Herbert Bos, professor of system and network security at the VU.
Por favor, Conectar o Crear cuenta para unirse a la conversación.
- Tamalero
-
Autor del tema
- Desconectado
- Navegador Platino
-
- Mensajes: 1217
- Gracias recibidas: 48
Intel perdiendo en promedio 16% de desempeño y mas del 20% en sistemas que usan mucho el IO y Hypervisores/virtualizacion.
www.phoronix.com/scan.php?page=article&item=mds-zombieload-mit&num=1
Por favor, Conectar o Crear cuenta para unirse a la conversación.
- Passenger
-
- Desconectado
- Moderador
-
Por favor, Conectar o Crear cuenta para unirse a la conversación.