{"id":3039,"date":"2019-05-19T15:11:53","date_gmt":"2019-05-19T14:11:53","guid":{"rendered":"https:\/\/werle.pro\/?p=3039"},"modified":"2019-05-19T15:35:05","modified_gmt":"2019-05-19T14:35:05","slug":"ssi-cpu-microarchitect-data-sampling-meltdown-spectre","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2019\/05\/19\/ssi-cpu-microarchitect-data-sampling-meltdown-spectre\/","title":{"rendered":"SSI CPU &#8211; Microarchitect Data Sampling, Meltdown &#038; Spectre"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3038 alignnone size-full\" src=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/ob_33e06f_zombieload7572351311768714095.png?resize=600%2C400&#038;ssl=1\" width=\"600\" height=\"400\" srcset=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/ob_33e06f_zombieload7572351311768714095.png?w=600&amp;ssl=1 600w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/ob_33e06f_zombieload7572351311768714095.png?resize=200%2C133&amp;ssl=1 200w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/ob_33e06f_zombieload7572351311768714095.png?resize=512%2C341&amp;ssl=1 512w\" sizes=\"(max-width: 600px) 100vw, 600px\" data-recalc-dims=\"1\" \/><\/p>\n<p>Article en fran\u00e7ais par Global Informatique S\u00e9curit\u00e9 plus bas sur la page<\/p>\n<h3>threatpost.com<\/h3>\n<h3>Intel ZombieLoad Side-Channel Attack: 10 Takeaways<\/h3>\n<p>Author: <em>Lindsey O&rsquo;Donnell<\/em><br \/>\n9-12 minutes<\/p>\n<h4>Here are 10 top takeaways from Intel\u2019s most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week.<\/h4>\n<p>Intel on Tuesday revealed a new class of speculative execution vulnerabilities, dubbed Microarchitectural Data Sampling (MDS), which impact all its modern CPUs.<\/p>\n<p>The flaws all ultimately depend on different ways of executing side channel attacks to siphon data from impacted systems \u2013 and result in four different attacks: <strong>ZombieLoad, Fallout, RIDL (Rogue In-Flight Data Load) and Store-to-Leak Forwarding.<\/strong><\/p>\n<p>\u201cAs a result of the flaw in the architecture of these processors, an attacker who can execute malicious code locally on an affected system can compromise the confidentiality of data previously handled on the same thread or compromise the confidentiality of data from other hyperthreads on the same processor as the thread where the malicious code executes,\u201d Eric Maurice, director of security for Oracle, recently wrote in an advisory.<\/p>\n<h3>Here are 10 top takeaways from this latest speculative execution side channel attack impacting Intel chips.<\/h3>\n<h4>MDS Different Than Meltdown and Spectre<\/h4>\n<p>The flaws derive from a process called speculative execution in processors. This process \u2013thrown into the spotlight after the 2018 Spectre and Meltdown flaws came to light \u2013 is used in microprocessors so that memory can read before the addresses of all prior memory writes are known.<\/p>\n<p>However, while speculative execution side channel attacks \u2013 like Spectre and Meltdown \u2013 targeted data stored in the CPU\u2019s memory; MDS instead refers to issues related to microarchitectural structures of the Intel processors other than the level 1 data cache (where memory is stored). Those issues exists in components called buffers, such as Fill Buffers (temporary buffers between CPU caches), Load Ports (temporary buffers used when loading data into registers) or Store Buffers (temporary buffers to hold store addresses and data).<\/p>\n<h4>Intel Seeking to Downplay Impact<\/h4>\n<p>There are four vulnerabilities in total tied to MDS.<\/p>\n<p>Those are <strong>CVE-2018-12126, CVE-2018-12127, CVE-2018-12130 <\/strong>and<strong> CVE-2019-11091<\/strong>.<\/p>\n<p>Intel sought to downplay the vulnerabilities, saying that: \u201cMDS vulnerabilities have been classified as low to medium severity per the industry standard CVSS, and it\u2019s important to note that there are no reports of any real world exploits of these vulnerabilities.\u201d<\/p>\n<p>Indeed, CVE-2019-11091 has the lowest severity, with a CVSS score of 3.8, and exists in the microarchitectural data sampling structure for uncacheable memory in CPUs. CVE-2018-12126 (which exists in the Store Buffer), CVE-2018-12127 (which exists in the Load Port) and CVE-2018-12130 (existing in the Fill Buffer) meanwhile have a CVSS score or 6.5, or medium severity.<\/p>\n<h4>Different Attacks Exist to Exploit Flaws<\/h4>\n<p>Meanwhile, an array of independent researchers from VUSec, CISPA, Graz University of Technology, and more have developed attacks for these vulnerabilities. Those proof-of-concept attacks were also disclosed Tuesday in coordination with Intel, after mitigations were developed.<\/p>\n<p>Those four different attack vectors are dubbed ZombieLoad, Fallout, RIDL (Rogue In-Flight Data Load) and Store-to-Leak Forwarding. While these attacks are all based on speculative execution targeting the buffer component of CPUs, they all work in different ways, exploit different flaws and result in different impacts.<\/p>\n<p>For instance, while ZombieLoad allows attackers to leak information from other applications, the operating system, virtual machines in the cloud and trusted execution environments; the Fallout attack allows to read data that the operating system recently wrote and to figure out the memory position of the operating system strengthening other attack, and RIDL attack allows to leak information across various security domains<\/p>\n<h4>ZombieLoad: The Hard-Hitting Attack<\/h4>\n<p>The most severe of these attacks is dubbed ZombieLoad, which attacks CVE-2018-12130, the flaw in the Fill Buffer of Intel CPUs. That\u2019s because this attack leaks the most data \u2013 attackers are able to siphon data from system applications, operating system and virtual machines. According to a research paper released on Tuesday, researchers said that disabling hyperthreading is the \u201conly possible workaround to mitigate ZombieLoad on current processors.\u201d<\/p>\n<p>\u201cWith ZombieLoad, we showed a novel Meltdown-type attack targeting the processor\u2019s fill-buffer logic. ZombieLoad enables an attacker to leak recently loaded values used by the current or sibling logical CPU,\u201d researchers said.<\/p>\n<p>ZombieLoad was discovered and reported by Michael Schwarz, Moritz Lipp and Daniel Gruss from the Graz University of Technology (known for their previous discoveries of similar attacks, including Meltdown) as well as researchers from KU Leuven, Cyberus Technology and the Worcester Polytechnic Institute.<br \/>\nOnly Intel is Impacted (That We Know)<\/p>\n<p>It appears at this time that Intel is the only manufacturer whose chips are impacted. AMD and ARM have both made public statements that the attacks and vulnerabilities related to MDS do not affect their chips.<\/p>\n<p>In a statement, AMD said: \u201cAt AMD we develop our products and services with security in mind. Based on our analysis and discussions with the researchers, we believe our products are not susceptible to \u2018Fallout\u2019 or \u2018RIDL\u2019 because of the hardware protection checks in our architecture. We have not been able to demonstrate these exploits on AMD products and are unaware of others having done so.\u201d<\/p>\n<h4>Future Chips Won\u2019t Be Vulnerable<\/h4>\n<p>According to Intel\u2019s microcode update guidance, most Intel Core and Xeon chips dating back to 2011 are theoretically vulnerable to MDS-related flaws.<\/p>\n<p>However, Intel said that the new MDS class of flaws is addressed in hardware starting with select 8th and 9th Generation Intel Core processors, as well as the 2nd Generation Intel Xeon Scalable processor family. Future chips will also have integrated fixes, Intel said.<\/p>\n<h4>Flood of Vendors Security Advisories<\/h4>\n<p>While Intel has provided CPU microcode updates, and recommendations for mitigation strategies for operating system (and hypervisor) software, the company recommends users install the software updates provided by your operating system and\/or hypervisor vendor. An array of vendors have released separate security advisories in response to MDS, including Red Hat, Oracle, Apple, Google and Microsoft.<\/p>\n<p>\u201cMicrosoft has released software updates to help mitigate these vulnerabilities,\u201d according to a Microsoft advisory released Tuesday. \u201cTo get all available protections, firmware (microcode) and software updates are required. This may include microcode from device OEMs. In some cases, installing these updates will have a performance impact. We have also acted to secure our cloud services.\u201d<\/p>\n<p>To completely address these issues, Intel said that there are additional opt-in mitigations to disable hyper threading and enable microcode-based mitigations for all processes by default.<\/p>\n<h4>Performance Hits From Fixes Ignite Concerns<\/h4>\n<p>News that Intel\u2019s fix for ZombieLoad will slow CPU performance has ignited concerns that people will be dissuaded to update their machines. It was a similar case when Spectre and Meltdown fixes were first introduced in 2018.<\/p>\n<h4>Intel performance hits flaw<\/h4>\n<p>For instance, in a security release Apple said that in tests it found \u201cas much as a 40 percent reduction in performance with tests that include multithreaded workloads and public benchmarks\u201d depending on the system.<\/p>\n<p>Intel for its part has a much smaller performance hit estimate: Foe example, in a Core i9 9900K with Hyper-Threading disabled, the company said that the hit could be as little as 9 percent on select data center workloads post-mitigation, for instance.<\/p>\n<h4>How can People Know if Their Systems are Impacted?<\/h4>\n<p>Researchers said that it is \u201cvery likely\u201d that Intel chip users\u2019 systems are impacted by the MDS vulnerabilities and subsequent attacks.<\/p>\n<p>\u201cOur attacks affect all modern Intel CPUs in servers, desktops and laptops,\u201d said Fallout researchers in a post. \u201cThis includes the latest 9th-generation processors, despite their in-silicon mitigations for Meltdown. Ironically, 9th-generation CPUs are more vulnerable to some of our attacks compared to older generation hardware.\u201d<\/p>\n<p>Researchers also made a tool, available here, to discover whether their systems are impacted.<\/p>\n<h4>Side Channel Attacks Continue<\/h4>\n<p>The incident shows that side channel speculative execution attacks continue to plague Intel chips since the Spectre and the related Meltdown vulnerability were disclosed in 2018. For instance, in May 2018, in May, a new vulnerability was found called Variant 4, disclosed by Google Project Zero and Microsoft\u2019s Security Response Center; researchers said it potentially enables attackers to read privileged data across trust boundaries.<\/p>\n<p><strong>Meanwhile, a new Spectre-class exploit, dubbed SpectreRSB, was detailed by researchers from the University of California at Riverside in a research paper in July; while in August, three new speculative execution design flaws in Intel CPUs were disclosed, impacting Intel\u2019s Software Guard Extensions (SGX) technology, its OS and system management mode (SMM) and hypervisor software.<\/strong><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"tBqrp58sU2\"><p><a href=\"https:\/\/threatpost.com\/intel-zombieload-side-channel-attack-10-takeaways\/144771\/\">Intel ZombieLoad Side-Channel Attack: 10 Takeaways<\/a><\/p><\/blockquote>\n<p><iframe title=\"&#8220;Intel ZombieLoad Side-Channel Attack: 10 Takeaways&#8221; &#8212; Threatpost - English - Global - threatpost.com\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/threatpost.com\/intel-zombieload-side-channel-attack-10-takeaways\/144771\/embed\/#?secret=tBqrp58sU2\" data-secret=\"tBqrp58sU2\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3><u>Article en fran\u00e7ais par Global Informatique S\u00e9curit\u00e9<\/u><\/h3>\n<h3>Global Informatique Securite<\/h3>\n<h3>ZombieLoad, en 10 points, \u00ab\u00a0coup de tonnerre sur les processeurs Intel\u00a0\u00bb<\/h3>\n<p><em>Yomane<\/em><\/p>\n<p>Intel a r\u00e9v\u00e9l\u00e9 mardi une nouvelle classe de vuln\u00e9rabilit\u00e9s d&rsquo;ex\u00e9cution sp\u00e9culatives , baptis\u00e9es MDS (Microarchitect Data Sampling), qui ont un impact sur tous ses processeurs modernes.<\/p>\n<p>Les failles d\u00e9pendent toutes en fin de compte de diff\u00e9rentes mani\u00e8res d\u2019ex\u00e9cuter des attaques par canaux secondaires pour siphonner les donn\u00e9es des syst\u00e8mes affect\u00e9s &#8211; et aboutissent \u00e0 quatre attaques diff\u00e9rentes: ZombieLoad, Fallout, RIDL (Chargement de donn\u00e9es en vol non autoris\u00e9) et Forward to Leak Forwarding.<br \/>\nMDS spectre faille s\u00e9curit\u00e9 vuln\u00e9rabilit\u00e9 Intel microprocesseur puce Microarchitect Data Sampling<\/p>\n<p>Information: \u00abEn raison de la faille de l&rsquo;architecture de ces processeurs, un attaquant pouvant ex\u00e9cuter du code malveillant localement sur un syst\u00e8me affect\u00e9 peut compromettre la confidentialit\u00e9 des donn\u00e9es pr\u00e9c\u00e9demment trait\u00e9es sur le m\u00eame thread ou la confidentialit\u00e9 des donn\u00e9es d&rsquo;autres hyperthreads situ\u00e9s sur le m\u00eame ordinateur. processeur comme le fil d&rsquo;ex\u00e9cution du code malveillant \u00bb<\/p>\n<p>a r\u00e9cemment d\u00e9clar\u00e9 Eric Maurice, directeur de la s\u00e9curit\u00e9 chez Oracle, dans un avis .<\/p>\n<p>Voici 10 points \u00e0 retenir de cette derni\u00e8re attaque de canal lat\u00e9ral d&rsquo;ex\u00e9cution sp\u00e9culative ayant une incidence sur les puces Intel :<\/p>\n<p><a href=\"http:\/\/www.global-informatique-securite.com\/2019\/05\/zombieload-en-10-points-coup-de-tonnerre-sur-les-processeurs-intel.html\">http:\/\/www.global-informatique-securite.com\/2019\/05\/zombieload-en-10-points-coup-de-tonnerre-sur-les-processeurs-intel.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article en fran\u00e7ais par Global Informatique S\u00e9curit\u00e9 plus bas sur la page threatpost.com Intel ZombieLoad Side-Channel Attack: 10 Takeaways Author: Lindsey O&rsquo;Donnell 9-12 minutes Here are 10 top takeaways from Intel\u2019s most recent class of Spectre-like speculative execution vulnerabilities, disclosed this week. Intel on Tuesday revealed a new class of speculative execution vulnerabilities, dubbed Microarchitectural &#8230; <a title=\"SSI CPU &#8211; Microarchitect Data Sampling, Meltdown &#038; Spectre\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2019\/05\/19\/ssi-cpu-microarchitect-data-sampling-meltdown-spectre\/\" aria-label=\"Read more about SSI CPU &#8211; Microarchitect Data Sampling, Meltdown &#038; Spectre\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-N1","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3039"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3039"}],"version-history":[{"count":3,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3039\/revisions"}],"predecessor-version":[{"id":3042,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3039\/revisions\/3042"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}