Researchers Find Seven New Meltdown and Spectre Attacks

Published by

Click here to post a comment for Researchers Find Seven New Meltdown and Spectre Attacks on our message forum
https://forums.guru3d.com/data/avatars/m/268/268759.jpg
No no no no xD
https://forums.guru3d.com/data/avatars/m/258/258664.jpg
These issues won't disappear in the years to come....
https://forums.guru3d.com/data/avatars/m/79/79740.jpg
fantaskarsef:

These issues won't disappear in the years to come....
Yep, will always be something new. Even if spectre/meltdown resolved, something else will come along.
https://forums.guru3d.com/data/avatars/m/274/274977.jpg
Well, at least they're brand-agnostic 😉
https://forums.guru3d.com/data/avatars/m/258/258664.jpg
alanm:

Yep, will always be something new. Even if spectre/meltdown resolved, something else will come along.
Exactly. And Meltdown / Spetre are also here to stay as long as speculative execution / prefetching of certain things is a thing.
https://forums.guru3d.com/data/avatars/m/246/246171.jpg
Meanwhile, the mitigations revolving around the vulnerabilities HyperThreading are severe enough that you might as well just simply turn off HT in BIOS. I'm not yet sure if Windows has been patched for that.
https://forums.guru3d.com/data/avatars/m/258/258688.jpg
Another false alarm, apparently, by "researchers" seeking publicity for themselves and their associated colleges. Intel writes: The vulnerabilities documented in this paper can be fully addressed by applying existing mitigation techniques for Spectre and Meltdown, including those previously documented here, and elsewhere by other chipmakers. Protecting customers continues to be a critical priority for us and we are thankful to the teams at Graz University of Technology, imec-DistriNet, KU Leuven, & the College of William and Mary for their ongoing research In other words, these holes have already been filled! ZDNet always seems to sensationalize things--I never go there, myself, anymore. Haven't for many years. Ah, the battle for page hits goes on! So funny how they put this response by Intel at the *bottom* of the article...;) There is nothing new to report here.
data/avatar/default/avatar23.webp
schmidtbag:

Meanwhile, the mitigations revolving around the vulnerabilities HyperThreading are severe enough that you might as well just simply turn off HT in BIOS. I'm not yet sure if Windows has been patched for that.
Is the general consensus that the HT vulnerabilities are critical even for the average joe? Because 4C/8T CPUs would suffer a horrible performance decrease in modern games if losing HT.
https://forums.guru3d.com/data/avatars/m/80/80129.jpg
waltc3:

Another false alarm, apparently, by "researchers" seeking publicity for themselves and their associated colleges. Intel writes: The vulnerabilities documented in this paper can be fully addressed by applying existing mitigation techniques for Spectre and Meltdown, including those previously documented here, and elsewhere by other chipmakers. Protecting customers continues to be a critical priority for us and we are thankful to the teams at Graz University of Technology, imec-DistriNet, KU Leuven, & the College of William and Mary for their ongoing research In other words, these holes have already been filled! ZDNet always seems to sensationalize things--I never go there, myself, anymore. Haven't for many years. Ah, the battle for page hits goes on! So funny how they put this response by Intel at the *bottom* of the article...;) There is nothing new to report here.
What are you talking about? https://arxiv.org/pdf/1811.05441.pdf Here is the paper - Most of the authors were the ones who originally found spectre/meltdown. Doesn't seem like it's "seeking publicity".. just seems like they are publishing their research as any researcher would. Also the paper concludes that the mitigations Intel is talking about don't block all the attacks here:
Transient execution attacks leak otherwise inaccessible information via the CPU’s microarchitectural state from instructions which are never committed. We presented a sound and extensible systematization of transient execution attacks. Our systematization uncovered 7 (new) transient execution attacks (Spectre and Meltdown variants) which have been overlooked and have not been investigated so far. We demonstrated all these variants in practical proof-of-concept attacks and evaluated their applicability to Intel, AMD, and ARM processors. We also systematically evaluated all defenses, discovering that some transient execution attacks are not successfully mitigated by the rolled out patches and others are not mitigated because they have been overlooked. Hence, we need to think about future defenses carefully and plan to mitigate attacks and variants that are yet unknown. and even if they did the entire point of publishing the attacks regardless to mitigation is A. Not all machines are getting upgraded with mitigation and B. So other people can build off the research and ideas found here and look for other methods that may not be mitigated already.
And even if they did block all the attacks how is that relevant to the research in the paper? Numerous machines aren't being updated and the attack vectors are new and can potentially lead other researchers into ideas that aren't mitigated. This is how science works, you build off the previous work of others and share it.
https://forums.guru3d.com/data/avatars/m/251/251862.jpg
Yxskaft:

Is the general consensus that the HT vulnerabilities are critical even for the average joe?
Should the 'average joe' even care? To get 'hacked', a professional 'security researcher' would bring his lab to your house, then he would stay there for weeks while you play games as he tries to steal a few bytes from your CPU's cache in hopes of getting your Steam password to steal your trading cards :O
https://forums.guru3d.com/data/avatars/m/246/246171.jpg
Yxskaft:

Is the general consensus that the HT vulnerabilities are critical even for the average joe? Because 4C/8T CPUs would suffer a horrible performance decrease in modern games if losing HT.
I'm not really sure. I personally would argue no, but it would be irresponsible of companies like Intel, AMD, IBM, MS, and so on to say that it isn't, because in doing so, that basically just welcomes hackers to find a way to exploit it, where it is basically guaranteed to not be prevented. In other words, as long as malware devs are led to believe that a known vulnerability will go un-mitigated, they can effortlessly take advantage of that. However, I don't think the average gamer really has anything to worry about at all (in terms of keeping HT on without mitigations). I would imagine that most single-threaded applications aren't really in danger either, so long as they lock down their core so another malicious thread in the pipeline can't sneak in with execution prediction.
https://forums.guru3d.com/data/avatars/m/273/273678.jpg
WareTernal:

Should the 'average joe' even care? To get 'hacked', a professional 'security researcher' would bring his lab to your house, then he would stay there for weeks while you play games as he tries to steal a few bytes from your CPU's cache in hopes of getting your Steam password to steal your trading cards :O
This is exactly it, for the end user, protection mechanisms implemented in the browser code are enough for peace of mind.
https://forums.guru3d.com/data/avatars/m/246/246171.jpg
Astyanax:

This is exactly it, for the end user, protection mechanisms implemented in the browser code are enough for peace of mind.
Actually no, it isn't. Kind of the point why these vulnerabilities are so scary is current protection mechanism can't detect them. This is why there's new microcode that basically causes unanimous performance losses.
https://forums.guru3d.com/data/avatars/m/273/273678.jpg
schmidtbag:

Actually no, it isn't. Kind of the point why these vulnerabilities are so scary is current protection mechanism can't detect them. This is why there's new microcode that basically causes unanimous performance losses.
Yes, actually it is. The only people who are at risk from this crap are companies at risk frpm long term espionage and spying. No low profile hackers after a quick data leak will be using them, to claim otherwise is to be completely ignorant of the blackhat landscape.
https://forums.guru3d.com/data/avatars/m/268/268248.jpg
WareTernal:

Should the 'average joe' even care? To get 'hacked', a professional 'security researcher' would bring his lab to your house, then he would stay there for weeks while you play games as he tries to steal a few bytes from your CPU's cache in hopes of getting your Steam password to steal your trading cards :O
Oh no no no, they will drink all my beer!
https://forums.guru3d.com/data/avatars/m/246/246171.jpg
Astyanax:

Yes, actually it is. The only people who are at risk from this crap are companies at risk frpm long term espionage and spying. No low profile hackers after a quick data leak will be using them, to claim otherwise is to be completely ignorant of the blackhat landscape.
I would agree with that (hence the post I made before yours). But, that doesn't mean your web browser is going to protect you from this kind of stuff, in the event such a thing were ever made in the first place.
https://forums.guru3d.com/data/avatars/m/56/56686.jpg
and it begin again let public panic begin anew,
https://forums.guru3d.com/data/avatars/m/232/232130.jpg
Venix:

Oh no no no, they will drink all my beer!
The scariest attack of them all.
https://forums.guru3d.com/data/avatars/m/232/232130.jpg
SweenJM:

don't be afraid, just be cautious, and maybe don't make enemies in hacker communites.
Especially beware of triggered kids trying to hack your IP address (127.0.0.1) 😀 But yeah, as far as you keep your router well maintained and aware of basic security risks, getting into your PC from outside not gonna be an easy task. Much easier to direct victim to phishing site / program and let it take care of itself.
https://forums.guru3d.com/data/avatars/m/274/274977.jpg
SweenJM:

maybe don't make enemies in hacker communites.
Well, good thing I don't frequent these communities at all, right? I mean, I don't even shitpost! In this day and age, where farting the wrong way on Facebook can get you kicked out of a job for being a "sexist fascist nazi pig", or a "marxist regressive leftist cuck", one has to be ever vigillant and careful of what (s)he says... Right...