Researchers Discover new Intel processor Vulnerability - the BranchScope Attack

Published by

Click here to post a comment for Researchers Discover new Intel processor Vulnerability - the BranchScope Attack on our message forum
https://forums.guru3d.com/data/avatars/m/248/248994.jpg
How is it possible for Intel to have been working on this with the researchers? I thought the modern modus operandi is to reveal the flaw to the hardware manufacturer 24 hours before making it public? How much research can you do in 24 hours, huh?
https://forums.guru3d.com/data/avatars/m/272/272918.jpg
more crippling microcode due then?
data/avatar/default/avatar19.webp
insp1re2600:

more crippling microcode due then?
I hope not. We have been working with these researchers and we have determined the method they describe is similar to previously known side channel exploits. We anticipate that existing software mitigations for previously known side channel exploits, such as the use of side channel resistant cryptography, will be similarly effective against the method described in this paper Sounds like the Spectre/Meldown updates should be enough to protect against this new exploit.
https://forums.guru3d.com/data/avatars/m/272/272918.jpg
Noisiv:

I hope not.
Same here, id have to chuck towel in with my 3770k if so lol.
https://forums.guru3d.com/data/avatars/m/253/253070.jpg
Wonderful... So Meltdown and Spectre exploited Branch Target Buffer (BTB) and now, BranchScope is the exploit of the CPU pattern history table (PHT). Guess more microcode is inc....This is tiresome.
https://forums.guru3d.com/data/avatars/m/122/122801.jpg
"The attacker needs to have access to the targeted system and they must be able to execute arbitrary code". Isn't that the same access as the AMD fake issue's? Access means I can do any number of things? Or am I missing something here?
https://forums.guru3d.com/data/avatars/m/247/247876.jpg
* yawn * boring...
https://forums.guru3d.com/data/avatars/m/245/245409.jpg
mbk1969:

* yawn * boring...
So with you on this one.
https://forums.guru3d.com/data/avatars/m/246/246171.jpg
Seems like yet another thing to not worry about - too difficult to exploit.
data/avatar/default/avatar07.webp
I haven't read the original docs but from what I get from this, you only need SO admin level to affect anything running on that hardware, u don't need physical or boot procedure access. This would mean u can run this exploits on a hired VM at amazon or azure and steal info from processes running on a different VM (as is the case with spectre and meltdown).
https://forums.guru3d.com/data/avatars/m/270/270008.jpg
jaggerwild:

"The attacker needs to have access to the targeted system and they must be able to execute arbitrary code". Isn't that the same access as the AMD fake issue's? Access means I can do any number of things? Or am I missing something here?
No it's not the same. To pull this Intel exploit off one must be able to execute code ie run a program/script which doesn't mean you need elevated privileges. This new BranchScope attack is similar to Spectre. The recent AMD flaws required a minimum of admin access(one possibly physical access depending on how one could flash the BIOS) which is much harder to obtain.
https://forums.guru3d.com/data/avatars/m/259/259067.jpg
Another one for Windows 7 users,which patched Windows against Meltdown: Security researcher Ulf Frisk has discovered that Microsoft’s Meltdown security patch for Windows 7 and Windows Server 2008 R2 allowed normal processes to be granted full read and write access to the physical memory. This means that whoever managed to exploit the flaw would have obtained administrator privileges on vulnerable machines. The technical analysis of the bug and the proof-of-concept exploit posted on Frisk’s blog reveal that taking advantage of the bug was not at all a complex process. “No fancy exploits were needed. Windows 7 already did the hard work of mapping in the required memory into every running process. Exploitation was just a matter of read and write to already mapped in-process virtual memory. No fancy APIs or syscalls required - just standard read and write!” he posted. https://blog.frizk.net/2018/03/total-meltdown.html?m=1
https://forums.guru3d.com/data/avatars/m/56/56686.jpg
I guess this gona be the new rage, lets out ever single vunarbiltiy to the public now
data/avatar/default/avatar19.webp
From what I understand, this one is pretty high threat because of the fact it can exploit SGX enclaves (basically "protected code and execution" areas) that doesn't need any form of process or code elevation: you can run it in a userland inside an SGX enclave within a VM and it can still exploit neighboring SGX enclaves AND host metal; no admin, drivers, cracked bios or firmware flashing needed, just code executing the right order of commands (works with various languages and compilers) and there isn't any kind of protected memory space at all on the system. Fortunately, this can be fixed in software, but the OS and all programs have to patch to protect against this, so the burden is mostly on software devs who want to run securely on Intel hardware. From what I gather, this should have only marginal performance cost, but due to certain encryption assumptions being invalidated means program (and host OS) stability MAY be rocky (though shouldn't be an issue). Honestly, to go on a bit of a tangent here, this is why I like to manually control when and IF my system updates are installed: I like to sit on patches for a week or two before I install it, just to be sure nothing undesirable happens. Though I do pick certain updates, based on their descriptions and affected areas, to install right away because I'm certain they don't cause issues and the fifteen minutes a month spent on this practice has saved me from days of downtime.
https://forums.guru3d.com/data/avatars/m/227/227994.jpg
No worries, we will get yet another patch followed by another leak etc etc. And at the end of the day with all 4792874525 patches applied our CPUs will perform like a Pentium 3.
https://forums.guru3d.com/data/avatars/m/239/239175.jpg
rl66:

it was quite good performance and lot of fun 🙂
What do you mean "was?" 🙂
https://forums.guru3d.com/data/avatars/m/56/56686.jpg
RealNC:

What do you mean "was?" 🙂
Which was? the fun or good performance?, I got alot fond memory about my old 286 8mhz ibm, if that thing still worked i would throw in my original king quest 1~4 and Space quest games I still have discs for and play em, even joe montana football, Budokan, Mechwarrior etc, game that were games all about the gameplay
https://forums.guru3d.com/data/avatars/m/272/272452.jpg
You are spot on about gameplay tsunami. I have been saying for years that a good game can "look like crap" but still be awesome fun. Vast majority of new games look pretty but "are crap". It doesnt matter if its flashy and polished if its crap to play.