Spectre New attacks, security fixes come up

After patching the first wave of Specter and Meltdown attacks, many relaxed. Error. The CPU Specter and Meltdown vulnerabilities showed a whole new way to attack systems, and all its experts s knew it was only a matter of time before new methods of attack were found.

Jann Horn, security researcher at Google Project Zero, like seems discovered a new method in a short time after the repair of the first Spectra fragility. Horn found a new way of attacking microprocessors. Spectre

The security gap affects not only Intel processors. It also affects the chipsets (x86) of AMD, POWER 8, POWER 9, System z and some ARM processors. In short, it could allow unauthorized read access to memory in almost any 21 century processor.

Ο αριθμός της ς (CVE) για αυτό το πρόβλημα ασφαλείας είναι ο CVE-2018-3639.

Η Intel αποκαλεί αυτή την παράκαμψη Speculative Store (SSB), γνωστή και ως Specter Variant 4. Σε αντίθεση με το σφάλμα που ανακάλυψε ο Yuriy Bulygin, ο πρώην επικεφαλής της προηγμένης ομάδας απειλών της Intel, το x86 management of Intel systems (SMM), SBB is a new attack method.

_____________________________

Another new but less dangerous Specter style security vacuum is that CVE-2018-3640, also known as Rogue System Register Read (RSRE) or Specter Variant 3a. With this vulnerability, local users may be able to obtain unauthorized disclosure of system parameters by analyzing side channels.

External attacks, through a browser and a malware page, are less likely with both Intel security loopholes.

This means (according to Intel):

“most browser developers have developed mitigation measures for Managed Runtimes, which significantly increase the difficulty of exploiting side channels. These techniques increase the difficulty of exploiting an SSB-based side-channel by a browser.”

Για την επίλυση του προβλήματος, η Intel έχει κυκλοφορήσει ενημερώσεις για μικροεπεξεργαστές σε μορφή beta για τους προγραμματιστές λειτουργικών συστημάτων, και κατασκευαστές συσκευών, προσθέτοντας υποστήριξη για την απενεργοποίηση της παρακαμπτήριας αποθήκευσης (Speculative Store Bypass Disable) (SSBD). Το SSBD παρέχει πρόσθετη , εμποδίζοντας την εμφάνιση της παράκαμψης Speculative Store. Η Intel ελπίζει ότι τα περισσότερα μεγάλα λειτουργικά συστήματα θα προσθέσουν υποστήριξη για το Speculative Store Bypass Disable (SSBD) ξεκινώντας από τις 21 Μαΐου 2018.

________________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.081 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).