{"id":10999,"date":"2018-01-04T08:10:36","date_gmt":"2018-01-04T16:10:36","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/04\/news-4770\/"},"modified":"2018-01-04T08:10:36","modified_gmt":"2018-01-04T16:10:36","slug":"news-4770","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/04\/news-4770\/","title":{"rendered":"Meltdown and Spectre: what you need to know"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 04 Jan 2018 15:53:24 +0000<\/strong><\/p>\n<p>The Google Project Zero team, in collaboration with other academic researchers, has published information\u00a0about three variants of a\u00a0hardware bug with important ramifications. These variants\u2014branch target injection\u00a0(<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5715\" target=\"_blank\" rel=\"noopener\">CVE-2017-5715<\/a>), bounds check bypass\u00a0(<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5753\" target=\"_blank\" rel=\"noopener\">CVE-2017-5753<\/a>)\u00a0and rogue data cache load\u00a0(<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5754\" target=\"_blank\" rel=\"noopener\">CVE-2017-5754<\/a>)\u2014affect <em>all modern processors<\/em>.<\/p>\n<p>If you&#8217;re wondering if you could be impacted, the answer is most certainly yes.<\/p>\n<p>The vulnerabilities, named named\u00a0<a href=\"https:\/\/meltdownattack.com\/meltdown.pdf\" target=\"_blank\" rel=\"noopener\">Meltdown<\/a>\u00a0and\u00a0<a href=\"https:\/\/spectreattack.com\/spectre.pdf\" target=\"_blank\" rel=\"noopener\">Spectre<\/a>, are particularly nasty, since they take place at a low level on the system, which makes them hard to find and hard to fix.<\/p>\n<p>The core issue stems from a design flaw that allows attackers to dump memory contents from any device (personal desktop, smartphone, cloud server, etc.) exposing passwords and other sensitive data. The flaw in question is tied to what is called <a href=\"https:\/\/cyber.wtf\/2017\/07\/28\/negative-result-reading-kernel-memory-from-user-mode\/\" target=\"_blank\" rel=\"noopener\">speculative execution<\/a>, which happens when a processor guesses next operations to perform based on previously cached iterations.<\/p>\n<p>It is not known whether threat actors are currently using these bugs. Although due to their implementation, it might be impossible to find out, as\u00a0<a href=\"https:\/\/meltdownattack.com\" target=\"_blank\" rel=\"noopener\">confirmed by the vulnerability researchers:<\/a><\/p>\n<blockquote>\n<p><em>Can I detect if someone has exploited Meltdown or Spectre against me?<br \/> <\/em>Probably not. The exploitation does not leave any traces in traditional log files.<\/p>\n<\/blockquote>\n<p>Modern computer architecture isolates user applications and the operating system, which helps to prevent unauthorized reading or writing to the system\u2019s memory. Similarly, this design prevents programs from accessing memory used by other programs.<\/p>\n<p>What Meltdown and Spectre do is bypass those security measures, therefore opening countless possibilities for exploitation. Cloud providers (<a href=\"https:\/\/aws.amazon.com\/de\/security\/security-bulletins\/AWS-2018-013\/\" target=\"_blank\" rel=\"noopener\">Amazon<\/a>,\u00a0<a href=\"https:\/\/blog.online.net\/2018\/01\/03\/important-note-about-the-security-flaw-impacting-arm-intel-hardware\/\" target=\"_blank\" rel=\"noopener\">Online.net<\/a>,\u00a0<a href=\"https:\/\/blog.digitalocean.com\/a-message-about-intel-security-findings\/\" target=\"_blank\" rel=\"noopener\">DigitalOcean<\/a>) rushed to issue emergency notifications to their customers for upcoming downtimes in order to prevent situations where code from the hypervisor could be leaked from a virtual machine, for example.<\/p>\n<p>The variant called\u00a0<em>Meltdown<\/em>\u00a0only impacts Intel CPUs, whereas the second set of variants called\u00a0<em>Spectre\u00a0<\/em>impacts all vendors of CPUs with support of\u00a0speculative execution. This includes most CPUs produced during the last 15 years from Intel, AMD, ARM and IBM.<\/p>\n<p>Several Proof of Concepts (POCs) have already been made available, and a video\u00a0<a href=\"https:\/\/youtu.be\/bReA1dvGJ6Y\" data-rel=\"lightbox-video-0\" target=\"_blank\" rel=\"noopener\">shows a memory extraction (using a non-disclosed POC)<\/a>.<\/p>\n<h3>Mitigations<\/h3>\n<p>A patch for the Meltdown bug has already been rolled out on\u00a0<a href=\"https:\/\/lkml.org\/lkml\/2017\/12\/4\/709\" target=\"_blank\" rel=\"noopener\">Linux<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/aionescu\/status\/948609809540046849\" target=\"_blank\" rel=\"noopener\">macOS<\/a>, and\u00a0<a href=\"https:\/\/twitter.com\/aionescu\/status\/930412525111296000\" target=\"_blank\" rel=\"noopener\">Windows 10 Insider Edition<\/a>. Unfortunately, the fix comes with significant impact on performance, although estimates of how much vary greatly.<\/p>\n<p>An <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv180002\" target=\"_blank\" rel=\"noopener\">advisory from Microsoft<\/a> recommends users to:<\/p>\n<ol>\n<li>Keep computers up to date.<\/li>\n<li>Install the applicable firmware update provided by OEM device manufacturers.<\/li>\n<\/ol>\n<p>If you are having issues getting the Windows update, please refer to <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072699\/important-information-regarding-the-windows-security-updates-released\" target=\"_blank\" rel=\"noopener\">this article<\/a>, as Microsoft has stated some possible incompatibility issues with certain security software.<\/p>\n<p>No software patch for Spectre is available at the time of this article. Partial hardening and mitigations are being worked on, but they are unlikely to be published soon.<\/p>\n<p>The Spectre bug\u00a0can be exploited via JavaScript and WebAssembly, which makes it even more critical. It is therefore recommended to apply some countermeasures such as <a href=\"https:\/\/support.google.com\/chrome\/answer\/7623121?hl=en-GB\" target=\"_blank\" rel=\"noopener\">Site Isolation in\u00a0Chrome<\/a>. Mozilla is rolling out a Firefox patch\u00a0<a href=\"https:\/\/blog.mozilla.org\/security\/2018\/01\/03\/mitigations-landing-new-class-timing-attack\/\" target=\"_blank\" rel=\"noopener\">to mitigate the issue while working on a long-term solution<\/a>. Microsoft is taking similar action for <a href=\"https:\/\/blogs.windows.com\/msedgedev\/2018\/01\/03\/speculative-execution-mitigations-microsoft-edge-internet-explorer\/\" target=\"_blank\" rel=\"noopener\">Edge and Internet Explorer<\/a>.<\/p>\n<p>The aftermath from these bugs is far from being completely understood, so please check back on this blog for further updates.<\/p>\n<p>Vendor advisories:<\/p>\n<ul>\n<li>Intel:\u00a0<a href=\"https:\/\/newsroom.intel.com\/news\/intel-responds-to-security-research-findings\/\" target=\"_blank\" rel=\"noopener\">https:\/\/newsroom.intel.com\/news\/intel-responds-to-security-research-findings\/<\/a><\/li>\n<li>AMD:\u00a0<a href=\"http:\/\/www.amd.com\/en\/corporate\/speculative-execution\" target=\"_blank\" rel=\"noopener\">http:\/\/www.amd.com\/en\/corporate\/speculative-execution<\/a><\/li>\n<li>ARM:\u00a0<a href=\"https:\/\/developer.arm.com\/support\/security-update\" target=\"_blank\" rel=\"noopener\">https:\/\/developer.arm.com\/support\/security-update<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/01\/meltdown-and-spectre-what-you-need-to-know\/\">Meltdown and Spectre: what you need to know<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/01\/meltdown-and-spectre-what-you-need-to-know\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 04 Jan 2018 15:53:24 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/01\/meltdown-and-spectre-what-you-need-to-know\/' title='Meltdown and Spectre: what you need to know'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/banner.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>2018 gets off to a rough start as manufacturers and software vendors tackle a series of severe bugs called Meltdown and Spectre that affect all modern computers.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/amd\/\" rel=\"tag\">AMD<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/arm\/\" rel=\"tag\">ARM<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/intel\/\" rel=\"tag\">Intel<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/meltdown\/\" rel=\"tag\">Meltdown<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/memory\/\" rel=\"tag\">memory<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/processor\/\" rel=\"tag\">processor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spectre\/\" rel=\"tag\">Spectre<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/01\/meltdown-and-spectre-what-you-need-to-know\/' title='Meltdown and Spectre: what you need to know'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/01\/meltdown-and-spectre-what-you-need-to-know\/\">Meltdown and Spectre: what you need to know<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17086,17087,8397,14989,11300,17088,10497,17082],"class_list":["post-10999","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-amd","tag-arm","tag-intel","tag-meltdown","tag-memory","tag-processor","tag-security-world","tag-spectre"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10999"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10999\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10999"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}