Jump to content

Security researchers discover seven more speculative execution attacks like Spectre and Meltdown

Speed Weed

Source: https://betanews.com/2018/11/14/spectre-meltdown-systematic-analysis/

Quote
One of the biggest security stories of 2018 has been the discovery of the Meltdown and Spectre chip flaws. Known as speculative execution exploits, the flaws make it possible to steal potentially sensitive information and there has been an on-going battle to issue patches wherever possible.

Just as things were starting to die down a little, security researchers have revealed details of no fewer than seven more speculative execution attacks. While some of these attack vectors have already been mitigated against, this is not the case for all of them.
As detailed by Ars Technica, researchers have undertaken a systematic analysis of the techniques involved in the Spectre and Meltdown exploits, and this is how the new variants have been discovered.
One of the newly-discovered exploits uses Intel's Protection Keys for Userspace (PKU), and Peter Bright explains:

Protection keys introduced with Skylake allow an application to mark pieces of memory with a four-bit key. Applications set the processor to use a particular protection key, and, during that time, attempts to access memory that is labeled with a different key will generate an error. Yet again, a few nanoseconds of speculation can occur between making an invalid access (accessing memory with a mismatched protection key) and the processor reporting the error, enabling information that should be protected to leak.

 
Quote

Intel, it seems, is not concerned, issuing a statement saying:

The vulnerabilities documented in this paper can be fully addressed by applying existing mitigation techniques for Spectre and Meltdown, including those previously documented here, and elsewhere by other chipmakers. Protecting customers continues to be a critical priority for us and we are thankful to the teams at Graz University of Technology, imec-DistriNet, KU Leuven, & the College of William and Mary for their ongoing research.

Oh man, when is this Spectre and Meltdown exploits are going to get fix permanently?! I mean for real though, the more Spectre and Meltdown exploits and patches, the more performance is going to get impact because some users have to disable Meltdown patch in order tor restore original performance. Right now, there is no known malicious application that can exploit Spectre and Meltdown, but in the future it will do if chip manufacturers don't seal the hole completely. 

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, Speed Weed said:

when is this Spectre and Meltdown exploits are going to get fix permanently

It looks like it's just a fundamental flaw with speculative execution

I WILL find your ITX build thread, and I WILL recommend the SIlverstone Sugo SG13B

 

Primary PC:

i7 8086k - EVGA Z370 Classified K - G.Skill Trident Z RGB - WD SN750 - Jedi Order Titan Xp - Hyper 212 Black (with RGB Riing flair) - EVGA G3 650W - dual booting Windows 10 and Linux - Black and green theme, Razer brainwashed me.

Draws 400 watts under max load, for reference.

 

How many watts do I needATX 3.0 & PCIe 5.0 spec, PSU misconceptions, protections explainedgroup reg is bad

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, fasauceome said:

It looks like it's just a fundamental flaw with speculative execution

It is still Spectre and Meltdown to me. 

Link to comment
Share on other sites

Link to post
Share on other sites

12 minutes ago, Firewrath9 said:

aw shit i hate those patches. imo would rather have the change of getting hacked then those patches.

Yeah the usefulness of the exploit seems based on luck. They can access information in your cache memory mostly at random. I have no clue what they would be trying to shoot for or how they would even get the virus on to the computer to run and how they would transmit that data to where it needs to go without anyone knowing. My question becomes how much of this is actually a problem if you just prevent the virus from being on the computer in the first place? I mean how much more of a threat is this compared to a run of the mill virus running on your computer?

Link to comment
Share on other sites

Link to post
Share on other sites

tbh I would rather have a chip that forgoes security over performance. 

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

7 hours ago, Brooksie359 said:

Yeah the usefulness of the exploit seems based on luck. They can access information in your cache memory mostly at random. I have no clue what they would be trying to shoot for or how they would even get the virus on to the computer to run and how they would transmit that data to where it needs to go without anyone knowing. My question becomes how much of this is actually a problem if you just prevent the virus from being on the computer in the first place? I mean how much more of a threat is this compared to a run of the mill virus running on your computer?

You can exploit these speculative from javascript so just visitimg a website could be quite bad.

 

 

That said I haven't heard of any in the wild malware taking advantage of the exploit.

 

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Canada EH said:

please have it disabled.

Well if I want 80% of websites to function that's not really an option is it?

 

 

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Canada EH said:

What websites are you visiting?

Literally any website that uses any of the major frameworks (angular, react, vue) even things like bootstrap require jQuery for some functions like modal Windows.

 

You can't log into Microsoft office website without JavaScript enabled, you can't register to facebook without JavaScript.

 

Much of the web depends on websotes to function correctly.

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

I rarely run into those problems and when I do, I analyze the site then disabled Java.

Its rare.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Canada EH said:

I rarely run into those problems and when I do, I analyze the site then disabled Java.

Its rare.

You said you had JavaScript disabled, not Java.

Java and JavaScript are two very different things.
For example if you turn of JavaScript on this website the quoting function stops working, along with the WYSIWYG editor.

If you visit this site without Java enabled, nothing change because this website doesn't use Java.

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, jagdtigger said:

No wait I mean the other way around, I prefer performance over security

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

12 hours ago, Brooksie359 said:

Yeah the usefulness of the exploit seems based on luck. They can access information in your cache memory mostly at random. I have no clue what they would be trying to shoot for or how they would even get the virus on to the computer to run and how they would transmit that data to where it needs to go without anyone knowing. My question becomes how much of this is actually a problem if you just prevent the virus from being on the computer in the first place? I mean how much more of a threat is this compared to a run of the mill virus running on your computer?

It's a problem for shared computing hardware or shared operating systems, if I could potentially read memory for any one of the VMs running on the host server or other user sessions on an RDS host then it's a problem for these use cases.

 

What would stop me signing up to a free trial of a RDS hosted platform, or paying a small 1 day fee, to see if I can exploit their system and then after that see what I can read. 

Link to comment
Share on other sites

Link to post
Share on other sites

13 minutes ago, leadeater said:

What would stop me signing up to a free trial of a RDS hosted platform, or paying a small 1 day fee, to see if I can exploit their system and then after that see what I can read. 

I would have hoped they have patched their systems by now :P

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

28 minutes ago, leadeater said:

What would stop me signing up to a free trial of a RDS hosted platform, or paying a small 1 day fee, to see if I can exploit their system

The feds. NZ is a member of FVEY.

ENCRYPTION IS NOT A CRIME

Link to comment
Share on other sites

Link to post
Share on other sites

14 minutes ago, straight_stewie said:

The feds. NZ is a member of FVEY.

That wouldn't stop anything, no 'policy' is actually going to do that it'll just define if and how big of a book they can throw at me if found out.

 

Though that was more of a general statement of collective me, anyone. If I could do it, so could the next guy from any country ?

Link to comment
Share on other sites

Link to post
Share on other sites

34 minutes ago, vorticalbox said:

I would have hoped they have patched their systems by now :P

Now days I wouldn't hope too hard lol. Pretty much all the big corporate and gov data breaches have all been from un-patched systems of known exploits.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, leadeater said:

That wouldn't stop anything, no 'policy' is actually going to do that it'll just define if and how big of a book they can throw at me if found out.

I was being facetious 

ENCRYPTION IS NOT A CRIME

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, straight_stewie said:

I was being facetious 

Yea I gathered that, just felt like saying that. That's kind of the thing about the internet too though, it pretty much doesn't actually matter where you are really from because very little can stop you from doing something and it's easy to hide where you are from. For all you know I could be in orbit jumping between sat links while drinking cocktails in zero gravity ?

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, leadeater said:

For all you know I could be in orbit jumping between sat links while drinking cocktails in zero gravit

Holy Astromod! That'd be one slow connection!

But yes. Anonymity is both a blessing and a curse of the internet.

ENCRYPTION IS NOT A CRIME

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, vorticalbox said:

You can exploit these speculative from javascript so just visitimg a website could be quite bad.

 

 

That said I haven't heard of any in the wild malware taking advantage of the exploit.

 

You can get alot bad shit from JavaScript if I remember correctly. I thought that is why most people are moving away from it. I always use ad block and have that type of stuff disabled. 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×