[sf-lug] Two new variants of Spectre vulnerability
aaronco36
aaronco36 at SDF.ORG
Tue May 22 18:36:43 PDT 2018
Two new variants of the Spectre CPU vulnerabaility were revealed
yesterday.
Quoting from CERT's Alert (TA18-141A) 'Side-Channel Vulnerability Variants
3a and 4' in ref [1]
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~`
Overview
On May 21, 2018, new variants of the side-channel central processing unit
(CPU) hardware vulnerabilities known as Spectre and Meltdown were publicly
disclosed [2]. These variants--known as 3A and 4--can allow an attacker to
obtain access to sensitive information on affected systems.
Description
Common CPU hardware implementations are vulnerable to the side-channel
attacks known as Spectre and Meltdown. Meltdown is a bug that "melts" the
security boundaries normally enforced by the hardware, affecting desktops,
laptops, and cloud computers. Spectre is a flaw that an attacker can
exploit to force a CPU to reveal its data.
Variant 3a is a vulnerability that may allow an attacker with local access
to speculatively read system parameters via side-channel analysis and
obtain sensitive information.
Variant 4 is a vulnerability that exploits "speculative bypass." When
exploited, Variant 4 could allow an attacker to read older memory values
in a CPU's stack or other memory locations. While implementation is
complex, this side-channel vulnerability could allow less privileged code
to
* Read arbitrary privileged data; and
* Run older commands speculatively, resulting in cache allocations that
could be used to exfiltrate data by standard side-channel methods.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~`
Further info on the Rogue System Register Read (RSRE) Spectre variant 3a /
CVE-2018-3640 is at ref [3]
Further info on the Speculative Store Bypass (SSB) Spectre variant 4 /
CVE-2018-3639 is at ref [4].
Might be a good idea to check the list of affected CPU's in Intel's
Security Alert within ref [2] and compare it with your own machine
architectures, and then consider the Solution Mitigation steps listed in
ref [1], as appropriate for your machines.
IMHO, there will likely be updated info and patches coming out soon on
this pair of vulnerabilities.
Further thoughts or suggestions regarding these new Spectre variants from
Rick M, Michael P, and/or anyone else reading this?
-A
================================
References
================================
[1]https://www.us-cert.gov/ncas/alerts/TA18-141A
[2]https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
[3]https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640
[4]https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
================================
aaronco36 at sdf.org
SDF Public Access UNIX System - http://sdf.org
More information about the sf-lug
mailing list