Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New 'Spoiler' vulnerability in all Intel Core processors exposed by researchers
appleinsider.com ^ | 3/7/2019 | Malcolm Owen

Posted on 03/07/2019 7:50:15 PM PST by bitt

A function of Intel's processors dealing with speculative execution has another vulnerability that affects all Intel-based computers including Apple's Mac, researchers have revealed, with "Spoiler" potentially allowing an attacker the ability to view the layout of memory, and in turn potentially access sensitive data stored in those locations.

The speculative execution function of Intel's processors, used to increase the performance of a CPU by predicting paths an instruction will go through before the branch is completed, is a useful function but one that has caused Intel issues in the past. A new report from security researchers from Worcester Polytechnic Institute and the University of Lubeck published on March 1 indicates there's another issue that needs to be fixed.

Dubbed "Spoiler," the technique is able to determine how virtual and physical memory is related to each other, by measuring the timing of speculative load and store operations performed by the processor, reports The Register. By spotting discrepancies in the timing, it is possible for an attacker to determine the memory layout, and in turn know areas to attack.

"The root cause of the issue is that the memory operations execute speculatively and the processor resolves the dependency when the full physical address bits are available," researcher Daniel Moghimi advised to the report. "Physical address bits are security sensitive information and if they are available to user space, it elevates the user to perform other micro architectural attacks."

(Excerpt) Read more at appleinsider.com ...


TOPICS: Business/Economy; Culture/Society; Extended News; Miscellaneous
KEYWORDS: computers; computing; hacking; intel; intelcore; processors; spoiler; spolier
Navigation: use the links below to view more comments.
first 1-2021-31 next last

1 posted on 03/07/2019 7:50:15 PM PST by bitt
[ Post Reply | Private Reply | View Replies]

To: dayglored; ShadowAce; Whenifhow; null and void; aragorn; EnigmaticAnomaly; kalee; Kale; ...

P


2 posted on 03/07/2019 7:51:03 PM PST by bitt (Is the PAIN coming???)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Billions of transistors, all off on their own, doing whatever.

What could possibly go wrong?


3 posted on 03/07/2019 7:53:33 PM PST by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Can’t tell the bugs from the features...


4 posted on 03/07/2019 7:53:51 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Sounds like a lot of work beyond my capability to breach someone’s system. I’ll wait till the AAP comes out.


5 posted on 03/07/2019 7:54:40 PM PST by Cold Heart (Oregon, tyranny and taxes)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Thanks for the memories.


6 posted on 03/07/2019 7:55:25 PM PST by granite (The heart of the wise inclines to the right, but the heart of the fool to the left.Ecclesiastes 10:2)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Need the “Executive Summary” in ENGLISH, Please.
Not all Freepers are software geeks!


7 posted on 03/07/2019 7:58:14 PM PST by TaMoDee (The Pack will be back in 2019! Go Pack!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Well, in 2020 Apple will supposedly stop using Intel chips.

Until then....


8 posted on 03/07/2019 7:58:50 PM PST by Jane Long (Praise God, from whom ALL blessings flow.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All
My next computer is going to be AI designed and built in China. I expect it will be great.

/s

9 posted on 03/07/2019 8:01:28 PM PST by BipolarBob (Dad, Send lawyers, guns and money.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mrsmith

10 posted on 03/07/2019 8:03:38 PM PST by bitt (Is the PAIN coming???)
[ Post Reply | Private Reply | To 4 | View Replies]

To: dayglored; ShadowAce; Whenifhow; null and void; aragorn; EnigmaticAnomaly; kalee; Kale; ...

P


11 posted on 03/07/2019 8:08:18 PM PST by bitt (Is the PAIN coming???)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mrsmith

I was taught that ALL bugs are FEATURES!

Bill Gate$ says.......


12 posted on 03/07/2019 8:14:05 PM PST by Paladin2
[ Post Reply | Private Reply | To 4 | View Replies]

To: bitt

Spoiler Alert.


13 posted on 03/07/2019 8:26:32 PM PST by Redcitizen
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Will there be a recall and of course refunds? /sarc


14 posted on 03/07/2019 8:29:26 PM PST by unixfox (Abolish Slavery, Repeal the 16th Amendment)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TaMoDee

I AM a GEEK. My job used to be to extend the sample BIOS supplied by Intel to take advantage of new Reliability And Serviceability (RAS) features for the three operating systems which run on the servers manufactured by my company.

“Physical address bits are security sensitive information and if they are available to user space, it elevates the user to perform other micro architectural attacks.”

There must be something else going on here, because this doesn’t make sense to a geek.

It wouldn’t be the first time that the technical writer scrambles the message. But the capability described above wouldn’t make me lose any sleep.


15 posted on 03/07/2019 8:35:12 PM PST by the_Watchman
[ Post Reply | Private Reply | To 7 | View Replies]

To: mrsmith

I recall the Clinton Administration being said to have wanted bugs like these.


16 posted on 03/07/2019 8:47:00 PM PST by Rurudyne (Standup Philosopher)
[ Post Reply | Private Reply | To 4 | View Replies]

To: the_Watchman

Engineers etc are rarely required to actually learn how to write good. *nudge*wink*


17 posted on 03/07/2019 8:49:41 PM PST by Rurudyne (Standup Philosopher)
[ Post Reply | Private Reply | To 15 | View Replies]

To: bitt

Greeeat. Do I need to wait for the next scam call from “Hardeep” (AKA “John”) addressing this problem?


18 posted on 03/07/2019 8:56:34 PM PST by RushIsMyTeddyBear
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; Ernest_at_the_Beach; martin_fierro; ...

19 posted on 03/08/2019 3:40:36 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: the_Watchman; TaMoDee
I agree with The Watchman. I would also point out that the way this works is that the bad guys are running user mode code on your computer. They can't do anything remotely. If they run user mode code on your computer, it's mostly game over even before these kinds of bugs which mostly allow privilege elevation.

In theory the user mode code could include javascript that you loaded simply by visiting a website. But I am pretty sure a javascript exploit will never come to fruition. Not only that, but a browser can defend against such an attack rather easily by small randomizations in javascript execution.

20 posted on 03/08/2019 4:30:55 AM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-31 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson