Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Horrific Security Flaw Affects Decade of Intel Processors
www.popularmechanics.com ^ | 03 January 2018 | By Eric Limer

Posted on 01/03/2018 1:55:39 PM PST by Red Badger

The fix requires major OS rewrites which will probably make your computer run slower.

An extremely severe security flaw has been found to affect nearly every Intel processor made in the past decade or more, giving any hackers who might know how to exploit it access to protected information systemwide. The Register reports that programmers are rushing to make the sweeping changes necessary to protect against the vulnerability on Linux and Windows operating systems, with such fixes required on macOS as well. Even worse, you can expect these vital updates to noticeably slow down your computer.

The design flaw in Intel's x86-64 hardware—first introduced in 2004 and still in use in the lion's share of modern-day processors—allows programs without the proper permissions to access the part of an operating system known as the kernel, a low-level chunk of code that controls literally everything in your system.

The exact details of the vulnerability are still somewhat under wraps, but as The Register has pieced together from multiple, technical sources, it appears the flaw is based in a feature called "speculative execution." This trick allows a processor to do things before it's absolutely sure they need to be done, so the results are ready as quickly as possible if needed and simply ignored if not. In Intel's x86-64 hardware, however, it appears that programs may be able to speculatively execute code they would not have permission to run under normal circumstances, allowing carefully-constructed, malicious code to essentially read your entire operating system's mind without the proper permission. The potential bounty of such an attack includes passwords, login files, and pretty much anything you'd ever want to keep secret.

It's hard to zero in on the most troubling part of this flaw. Intel's x86-64x processors are the most widely-used chips in virtually every form of laptop. If you don't know what processor you have, you almost certainly have one with this flaw. If you do have an AMD processor, however, congratulations—they are confirmed to be safe from the exploit.

In addition to the ubiquity of Intel processors, the low-level nature of this vulnerability means that hackers who may have learned to exploit it would have access to an unprecedented number of machines. And considering x86-64 has been around and prevalent since 2004, possible hackers have had access for over 10 years. No researchers have yet come forward with an example program that exploits this flaw, but that's hardly proof that hackers, or the NSA, didn't figure out how to make use of this exploit years ago.

On top of it all, the fix requires extremely deep and wide-reaching changes at the root levels of an operating system's software—changes that could impact performance of Intel machines by as much as 30 percent. The only alternative? A new computer with a different processor, or one powerful enough to make up for the performance hit. Even worse, these performance hits won't just come to your computer, but also the army of distant servers that run countless internet-connected services in the cloud.

So what can you do? Not much. If you have a computer with a competing AMD processor, pat yourself on the back and breathe easy. Otherwise, make sure that your computer's operating system is up to date with the latest security updates, though fixes for this particular problem may not be widely available for days or even weeks. Intel has yet to publicly comment on the vulnerability, but the consequences will likely reverberate for years.


TOPICS: Computers/Internet; Education; History; Society
KEYWORDS: cpu; flaw; hack; intel; intelprocessors; windowspinglist
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-111 next last
To: mkleesma

21 posted on 01/03/2018 2:21:15 PM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Red Badger

Highly unlikely.
More like BK, the current CEO tried to ignore it.
The guy is from the Fab and only knows process issues (similar to Craig Barrett)
Not a clue about employees, customers and or quality.
All about the bottom line.

Getting BK fired would be the first good thing that has happened at Intel since he took over.


22 posted on 01/03/2018 2:21:25 PM PST by Zathras
[ Post Reply | Private Reply | To 10 | View Replies]

To: ImJustAnotherOkie

Corporate servers can’t afford the delay to fix, or the slowness if fixed. Watch them switch to AMD and IBM Power servers quickly. Buy AMD and IBM stock?


23 posted on 01/03/2018 2:22:30 PM PST by spintreebob
[ Post Reply | Private Reply | To 13 | View Replies]

To: Red Badger

Nothing to see. It’s just the NSA opening up your backdoor.


24 posted on 01/03/2018 2:23:51 PM PST by bgill (CDC site, "We don't know how people are infected with Ebola.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Ping...


25 posted on 01/03/2018 2:24:44 PM PST by Windflier (Pitchforks and torches ripen on the vine. Left too long, they become black rifles.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger
Make your computer run slower
===================


26 posted on 01/03/2018 2:29:58 PM PST by sparklite2 (Read the Sparklite Times)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sparklite2

Back in the 80’s I had an IBM XT clone that had a ‘Turbo Boost’ button on the front.

I think all it did was turn on a light..................


27 posted on 01/03/2018 2:31:46 PM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 26 | View Replies]

To: Red Badger

Pfffttt...this is nothing compared to Apple slowing mobile devices with aging batteries a tiny bit to avoid sudden unexpected system shutdowns then offering nearly free battery replacements on your four year old phone.

Let’s keep some perspective here, people.


28 posted on 01/03/2018 2:35:58 PM PST by ProtectOurFreedom
[ Post Reply | Private Reply | To 1 | View Replies]

To: w1andsodidwe
#7: " Did an H1B visa employee do this?"

My experience with H1Bs is that they don't have any ethic for excellence. Their ethic is based on "good enough" or "slip one by". It is an ethos ingrained in them since childhood.

They take pride in their ability to "get over" and slide through life. Unless someone is looking over their shoulders, you can bet the task with be accomplished will minimal thought and care.
 

29 posted on 01/03/2018 2:43:10 PM PST by Governor Dinwiddie (CNN is fake news.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Red Badger

Until I see more info I’m skeptical. This could be nothing more than a timing delay when attempting to access certain kernel memory locations. The fact that there is no demonstrable exploit code makes me think it is just theoretical.


30 posted on 01/03/2018 2:45:36 PM PST by Gideon7
[ Post Reply | Private Reply | To 1 | View Replies]

To: cyberstoic

ditto and ditto


31 posted on 01/03/2018 2:49:53 PM PST by taxcontrol (Stupid should hurt)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Gideon7

Now that it is ‘known’ there will be those who will exploit it................


32 posted on 01/03/2018 2:50:44 PM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 30 | View Replies]

To: Red Badger
It was the speculative code branching that did them in, because it was coded carelessly.

From the Register article:

It appears, from what AMD software engineer Tom Lendacky was suggesting above, that Intel's CPUs speculatively execute code potentially without performing security checks. It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.

That would allow ring-3-level user code to read ring-0-level kernel data. And that is not good.


33 posted on 01/03/2018 2:56:22 PM PST by steve86 (Prophecies of Maelmhaedhoc O'Morgair (Latin form: Malachy))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Ah

The 0bama ‘chip’


34 posted on 01/03/2018 2:58:03 PM PST by combat_boots (God bless Israel and all who protect and defend her! Merry Christmas! In God We Trust!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

35 posted on 01/03/2018 2:58:13 PM PST by Vendome (I've Gotta Be Me - https://www.youtube.com/watch?v=wH-pk2vZG2M)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gideon7

It has already been demonstrated that small chunks of Ring 0 memory can be returned to user mode code.


36 posted on 01/03/2018 3:01:55 PM PST by steve86 (Prophecies of Maelmhaedhoc O'Morgair (Latin form: Malachy))
[ Post Reply | Private Reply | To 30 | View Replies]

To: Red Badger

AMD running Linux here, yay


37 posted on 01/03/2018 3:02:28 PM PST by Pollard (TRUMP 2020)
[ Post Reply | Private Reply | To 1 | View Replies]

To: steve86

“It has already been demonstrated that small chunks of Ring 0 memory can be returned to user mode code.”

Sure, but can you fetch a bigger, more meaningful chunk of kernel memory? Sure, if you increment the same small thing thousands of times over and over.


38 posted on 01/03/2018 3:10:11 PM PST by steve86 (Prophecies of Maelmhaedhoc O'Morgair (Latin form: Malachy))
[ Post Reply | Private Reply | To 36 | View Replies]

To: Red Badger

I thought you need physical access to the machine to exploit this.


39 posted on 01/03/2018 3:16:01 PM PST by Neanderthal (When you import the third world you become the third world)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

more detailed technical information:

https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/

This is a BFD, WFT, are you kidding me moment.

Software “fix” will slow down every Intel PC by 17%-23%


40 posted on 01/03/2018 3:17:23 PM PST by catnipman ( Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-111 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson