AMD has readied patches against MasterKey, Fallout, and Chimera vulnerabilities

Published by

Click here to post a comment for AMD has readied patches against MasterKey, Fallout, and Chimera vulnerabilities on our message forum
https://forums.guru3d.com/data/avatars/m/270/270786.jpg
They might want to disclose how much Intel paid CTS Labs... That would be really interesting to know. Is it 1 mil $, is it 10 mil $, is it 100 mil $ ??? It is so obvious and so directly targeted that nobody is interested in what they found.
https://forums.guru3d.com/data/avatars/m/271/271684.jpg
Is there still anyone who thinks this "security" company is concerned about anyones security? This was shady from the start and this kind of pestering and language only reinforces my doubts, even though the vulnerabilities are legitimate (but still quite useless for a potential attacker). Kudos to AMD for handling this with grace.
data/avatar/default/avatar10.webp
LOL since when is secure encryption considered "security through obscurity"? And a "security" citing wikipedia articles? LOOOOL
https://forums.guru3d.com/data/avatars/m/269/269649.jpg
I completely agree. #1 and #2
https://forums.guru3d.com/data/avatars/m/271/271131.jpg
What does "CTS" stand for?: [SPOILER]Catch The Sperm 🙂 (It's a PC game btw.!)[/SPOILER] I cannot hear it anymore TBH. CTS here, CTS there. Publishing a 0-day without notifiying the vendor first, adding pressure and false accusations, bragging about the vendor is "not able to fix it in several weeks (as we said)" and so on. 1.) When came the point where you are able to define exactly how long "several weeks" are? Several weeks could be 50 weeks and still would be "in time". It's like "I need some time.". This doesn't specify exactly in what time neither. "Some time" could be 5 minutes, it could be 50 years. 2.) The behaviour (0-day, pressure, etc.) rings a lot of bells in my head, but not in the way I think of a "security researcher" or "security professional", that goes more in the direction "blackhat", "unethical" or at last "attention w*ore". AMD did nothing wrong here (at least I am unable to see any wrongdoing). Bullsh!t-bingo at its finest! Btw.: Could you call this "cyber mobbing"? All indicators of classical mobbing are there: it happens not only once and over a (meanwhile) long period of time; it is only meant to destroy the reputation of one (usually individual, this time a company); false accusations and other unehtical methods are used to fulfil the goal, etc. etc. => sounds like mobbing to me. What do you guys think? 🙂
https://forums.guru3d.com/data/avatars/m/248/248994.jpg
I'm surprised this CTS Labs even exists anymore. The folks behind it had apparently used various front company names to pull off stock market and other tricks in the past as well. I reckon this case targeting AMD is their biggest heist so far, and they aren't sure when to stop. Probably they didn't manage to make as much money as they hoped when they first published these "shocking vulnerabilities". I'm not sure even Intel would deign to deal with these small-time crooks. Intel bosses might feel like there's no soap so strong it the world that they could ever wash the stench off if they shook hands these CTS Labs people.
https://forums.guru3d.com/data/avatars/m/243/243702.jpg
If only they were less stupid... Again, all they want it this being discussed in earnings call. All they care about is panic money.
https://forums.guru3d.com/data/avatars/m/229/229454.jpg
What, CTS Labs is still there? Also gotta love this: AMD: "... as well as patches mitigating Chimera across all AMD platforms..." CTS Labs: "... CHIMERA cannot be directly fixed..." also as pointed out above any "security" company citing Wikipedia articles as reference loses all credibility. Last, I really fail to see the point of that document. They accuse AMD of not releasing patches, in a couple of weeks, for vulnerabilities they themselves said would take months to fix? AMD should sue those mofos for all they're worth.
https://forums.guru3d.com/data/avatars/m/259/259995.jpg
Dare i ask why they even get there words on the page ;-) Smells alot !
data/avatar/default/avatar22.webp
Wow. Just... Wow. I mean, with Spectre and Meltdown we've seen just long it took for both Intel and AMD to release the patches (plus the mess Intel had with it's patches earlier that had to be halted). So not only they don't give a heads up about the "issues", but 6 weeks after disclosing "serious" and "dangerous" "threats" that would take months to fix, (and yeah, quote marks for each and every one of those words) they expect the patches to be ready and deployed? While I do wait and expect patches to solve every security issue, I rather also have them fully tested and glitch free (yeah, I'm poiting my finger at you Microsoft). So Yeah, professionalism at it's best. I hope in the near future whenever the words CTS and security show up, there's also a big sign about WHAT YOU SHOULD NOT DO WHILE YOU'RE A FREAKING SECURITY RESEARCH TEAM. Unless of course, unprofessionalism and biased research is what you're up to. Or... someone else is funding you.
https://forums.guru3d.com/data/avatars/m/165/165326.jpg
CTS Labs 🙄 sheeeshhh ... Money Driven Scammers and Not a Trusted Security Firm , may Karma take care of them !
https://forums.guru3d.com/data/avatars/m/250/250418.jpg
Exposing security flaws without talking with the company first and giving it time to fix it isn't good business practices. Threatening just exposes the nature of the attack, it was planed and money driven. I laughed my ass when they said the vulnerabilities need physical access to exploit. Only now are we knowing of more Spectre vulnerabilities, but they've been reported to Intel months ago. I understand why journalists report this news, but sometimes I wish they would let them die in the void.
data/avatar/default/avatar30.webp
I think the real headline here is CTS continues to validate its status as an unprofessional entity but their reported exploits indeed proved legitimate. No fault to AMD any more than fault to Intel for continual work to exploit their hardware for nefarious purposes.
data/avatar/default/avatar22.webp
I really wouldn't be surprised that Cambridge Analytica is behind this. Better said, that someone payed Cambridge Analytica to do their dirty work. Recently some very concerning stuff has come to light regarding their business. LINK: [youtube=mpbeOCKZFfQ] Or perhaps some other company with similar business model. It's pretty scary what kind of damage you can do to your opponent using modern technologies and internet. And it's even scarier knowing that there are companies specialized in doing your dirty work if you are willing to pay enough.
https://forums.guru3d.com/data/avatars/m/258/258688.jpg
AMD should call these people frauds, publicly, and write them off. All OSes are deliberately and purposefully written to open up to anyone with physical access and admin privileges! That's by design. No one should be giving these imbeciles the time of day, imo. They are worse than worthless.
https://forums.guru3d.com/data/avatars/m/270/270233.jpg
waltc3:

AMD should call these people frauds, publicly, and write them off. All OSes are deliberately and purposefully written to open up to anyone with physical access and admin privileges! That's by design. No one should be giving these imbeciles the time of day, imo. They are worse than worthless.
Relax. Nobody is taking CTS Labs seriously, and there's no point in generating more news about it. It was a failed assassination attempt, AMD is doing fine, it's all good.
https://forums.guru3d.com/data/avatars/m/246/246171.jpg
I guess it's good that AMD made patches to these "problems", just to appease the naysayers who would otherwise use their could-have-been "negligence" as flak, but at the same time I feel a little bit irritated that AMD is, in a way, justifying their actions. Don't feed the trolls.
AsiJu:

AMD should sue those mofos for all they're worth.
So they should sue them for $10? Because that's probably all they're going to get out of it. 😛
https://forums.guru3d.com/data/avatars/m/197/197287.jpg
Wow, CTS labs, have you even read your own "letter"? How much more unprofessional can a company get? lol?
https://forums.guru3d.com/data/avatars/m/196/196284.jpg
These guys are nothing but frauds. Even actual security experts have stated that it's impossible to predict exactly what AMD can or can not do with the Zen architecture because only AMD knows exactly how it functions. Also, AMD stated that fixes would be available "in the coming weeks".... So, by that statement, AMD is on time with the patches and CTS Labs has invalidated themselves. No legitimate security company releases a statement 6 weeks later..... They do their public disclosure and move on... Also, no real security firm purposefully ignores vulnerable products such as CTS Labs has done.....