{"id":12120,"date":"2018-04-24T14:30:16","date_gmt":"2018-04-24T22:30:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/24\/news-5889\/"},"modified":"2018-04-24T14:30:16","modified_gmt":"2018-04-24T22:30:16","slug":"news-5889","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/24\/news-5889\/","title":{"rendered":"Heads up: Total Meltdown exploit code now available on GitHub"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security8-100734737-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 24 Apr 2018 13:33:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Remember the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html\"><span style=\"font-weight: 400;\">Total Meltdown <\/span><\/a><span style=\"font-weight: 400;\">security hole? Microsoft spread the vulnerability in every 64-bit Win7 and Server 2008 R2 patch released this year, prior to March 29. Specifically, if you installed <\/span><strong><i>any <\/i><\/strong><span style=\"font-weight: 400;\">of these patches:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8230; your machine was left in an exposed state. Microsoft made changes to your PC that makes it easy for a running to program to look at, or modify, any data on your computer. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security researcher Ulf Frisk <\/span><a href=\"https:\/\/blog.frizk.net\/2018\/03\/total-meltdown.html\" rel=\"nofollow\"><span style=\"font-weight: 400;\">posted details<\/span><\/a><span style=\"font-weight: 400;\"> on March 27, giving the security hole the \u201cTotal Meltdown\u201d moniker. That\u2019s in reference to the well-publicized Meltdown and Spectre security holes, which initially started this year\u2019s patching frenzy. All of these patches and repatches existed primarily to circumvent Meltdown and Spectre \u2014 two security vulnerabilities that, to this day, have never been spotted in the wild.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keep in mind that Total Meltdown only applies to 64-bit versions of Win7 and Server 2008 R2 \u2014 and that it doesn\u2019t allow malicious programs to run on your machine, it \u201conly\u201d allows them to read or write data anywhere.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft responded on March 29 with a patch, <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3267700\/microsoft-windows\/windows-patches-for-total-meltdown-bluescreens-an-ip-stopper-and-little-documentation.html\"><span style=\"font-weight: 400;\">KB 4100480<\/span><\/a><span style=\"font-weight: 400;\">, which plugs the Total Meltdown security hole but introduces all sorts of additional problems. See threads started by <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/patch-lady-new-update-for-windows-7-kb-4100480\/#post-179854\" rel=\"nofollow\"><span style=\"font-weight: 400;\">MrBrian <\/span><\/a><span style=\"font-weight: 400;\">and <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-new-update-for-windows-7-kb-4100480\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\">Susan Bradley <\/span><\/a><span style=\"font-weight: 400;\">on AskWoody. According to <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4100480\/windows-kernel-update-for-cve-2018-1038\" rel=\"nofollow\"><span style=\"font-weight: 400;\">the KB article<\/span><\/a><span style=\"font-weight: 400;\">, that patch has been superceded by the two April Win7 security patches, released on April 10:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Both of those, in turn, were riddled with bugs. The Monthly Rollup, in particular, was so bad that Microsoft <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3268750\/microsoft-windows\/surprise-theres-a-new-version-of-this-months-buggy-win7-monthly-rollup-kb-4093118.html\"><span style=\"font-weight: 400;\">re-released it on April 12<\/span><\/a><span style=\"font-weight: 400;\">. But the new version kept <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3268942\/microsoft-windows\/you-won-t-believe-why-the-win7-monthly-rollup-kb-4093118-keeps-installing-itself.html\"><span style=\"font-weight: 400;\">installing and re-installing itself<\/span><\/a><span style=\"font-weight: 400;\">, even though Windows flagged it as already installed. If you get hit with that bug, the only solution at this point is to <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3268942\/microsoft-windows\/you-won-t-believe-why-the-win7-monthly-rollup-kb-4093118-keeps-installing-itself.html\"><span style=\"font-weight: 400;\">hide the update<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the past couple of days, self-described \u201cHacker and Infosec Researcher\u201d XPN<\/span><a href=\"https:\/\/blog.xpnsec.com\/total-meltdown-cve-2018-1038\/\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">has posted details<\/span><\/a><span style=\"font-weight: 400;\"> of a working exploit that takes advantage of Microsoft\u2019s Total Meltdown security hole. The exploit code, updated yesterday, is <\/span><a href=\"https:\/\/gist.github.com\/xpn\/bdb99cee8895bab4b1a0671696570d94\" rel=\"nofollow\"><span style=\"font-weight: 400;\">available on GitHub<\/span><\/a><span style=\"font-weight: 400;\">. XPN also has a <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=5fl5jFy4XMg\" rel=\"nofollow\"><span style=\"font-weight: 400;\">YouTube video<\/span><\/a><span style=\"font-weight: 400;\"> showing how quickly it all goes by. Remember: This is code that can retrieve or change any data in memory from a running program. Before it kicks in, a would-be attacker has to get the program running on your machine. But once it&#8217;s running, any program can get to any data on your machine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On AskWoody, GoneToPlaid <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/total-meltdown-not-meltdown-exploit-now-available\/#post-186636\" rel=\"nofollow\"><span style=\"font-weight: 400;\">lays it out<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I looked at the proof of concept code posted on GitHub by XPN. No malware techniques whatsoever were required, except simply replacing tokens for EPROCESS with SYSTEM. Yet this is done <\/span><i><span style=\"font-weight: 400;\">after<\/span><\/i><span style=\"font-weight: 400;\"> the code has already <\/span><i><span style=\"font-weight: 400;\">located<\/span><\/i><span style=\"font-weight: 400;\"> all computer memory to read in less than a second. The code doesn\u2019t go through the process of actually reading the memory since XPN was merely showing everyone how quickly the code was able to gain access to all computer memory, and then to change the access rights to all computer memory.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As of this moment, I haven\u2019t heard of any active exploits that take advantage of the Total Meltdown security hole, but with working code so easily available, it\u2019s only a matter of time. A short amount of time, at that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How to tell if you\u2019re exposed? <\/span><\/p>\n<p><strong>Step 1. <\/strong><span style=\"font-weight: 400;\">Look at your Update History and see if you have any patches installed this year. (See the list at the beginning of this article.) No patches from 2018? You\u2019re off the hook for Total Meltdown, although you\u2019re exposed for the (few) other real security holes plugged this year.<\/span><\/p>\n<p><strong>Step 2. <\/strong><span style=\"font-weight: 400;\">If you have any of the Windows patches listed above, look to see if you have KB 4100480, 4093108 or 4093118 installed. If any of those three are installed, you\u2019re fine.<\/span><\/p>\n<p><strong>Step 3. <\/strong><span style=\"font-weight: 400;\">If you have one of the Total Meltdown-infected patches installed, and you haven\u2019t yet installed KB 4100480, 4093108 or 4093118, you\u2019re in for some interesting times. As best I can tell, you have three options:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Be aware of the bugs in KB 4093108 and 4093118 (<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/total-meltdown-not-meltdown-exploit-now-available\/#post-186688\" rel=\"nofollow\"><span style=\"font-weight: 400;\">possible blue screen<\/span><\/a><span style=\"font-weight: 400;\"> Session_has_valid_pool_on_Exit). In particular, note that Microsoft has removed the old requirement that your antivirus software give the go-ahead by modifying the QualityCompat registry key. It isn\u2019t clear if that\u2019s a move of desperation \u2014 designed to get this month\u2019s security patches pushed onto every machine \u2014 or if antivirus manufacturers have cleaned up their products so the old restriction no longer applies (as is the case with Windows 10).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By the way, there\u2019s a silver lining to this dreck-drenched cloud. You Win7 folks won\u2019t have any patches at all after Jan. 14, 2020 \u2014 a scant 21 months from now. Something to look forward to, amirite?<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Questions? Hit us <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/win7-and-server-2008-r2-users-take-notice-its-only-a-matter-of-time-before-total-meltdown-comes-a-knockin\/\" rel=\"nofollow\"><i><span style=\"font-weight: 400;\">on AskWoody<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3269003\/microsoft-windows\/heads-up-total-meltdown-exploit-code-now-available-on-github.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security8-100734737-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 24 Apr 2018 13:33:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Remember the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html\"><span style=\"font-weight: 400;\">Total Meltdown <\/span><\/a><span style=\"font-weight: 400;\">security hole? Microsoft spread the vulnerability in every 64-bit Win7 and Server 2008 R2 patch released this year, prior to March 29. Specifically, if you installed <\/span><strong><i>any <\/i><\/strong><span style=\"font-weight: 400;\">of these patches:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>KB 4056894<\/strong><span style=\"font-weight: 400;\"> Win7\/Server 2008 R2 January Monthly Rollup<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4056897<\/strong><span style=\"font-weight: 400;\"> Win7\/Server 2008 R2 January Security-only patch<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4073578 <\/strong><span style=\"font-weight: 400;\">Hotfix for \u201cUnbootable state for AMD devices in Windows 7 SP1 and Windows Server 2008 R2 SP1\u201d bug installed in the January Monthly Rollup and Security-only patches<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4057400<\/strong><span style=\"font-weight: 400;\"> Win7\/Server 2008 R2 Preview of the February Monthly Rollup<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4074598 <\/strong><span style=\"font-weight: 400;\">Win7\/Server 2008 R2 February Monthly Rollup<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4074587 <\/strong><span style=\"font-weight: 400;\">Win7\/Server 2008 R2 February Security-only patch<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4075211 <\/strong><span style=\"font-weight: 400;\">Win7\/Server 2008 R2 Preview of the March Monthly Rollup<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4091290 <\/strong><span style=\"font-weight: 400;\">Hotfix for \u201csmart card based operations fail with error with SCARD_E_NO_SERVICE\u201d bug installed in the February Monthly Rollup<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4088875<\/strong><span style=\"font-weight: 400;\"> Win7\/Server 2008 R2 March Monthly Rollup<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4088878<\/strong><span style=\"font-weight: 400;\"> Win7\/Server 2008 R2 March Security-only patch<\/span><\/li>\n<li style=\"font-weight: 400;\"><strong>KB 4088881<\/strong><span style=\"font-weight: 400;\"> Win7\/Server 2008 R2 Preview of April Monthly Rollup<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">&#8230; your machine was left in an exposed state. Microsoft made changes to your PC that makes it easy for a running to program to look at, or modify, any data on your computer. <\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3269003\/microsoft-windows\/heads-up-total-meltdown-exploit-code-now-available-on-github.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-12120","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12120"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12120\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12120"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}