Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Horrific Security Flaw Affects Decade of Intel Processors
www.popularmechanics.com ^ | 03 January 2018 | By Eric Limer

Posted on 01/03/2018 1:55:39 PM PST by Red Badger

The fix requires major OS rewrites which will probably make your computer run slower.

An extremely severe security flaw has been found to affect nearly every Intel processor made in the past decade or more, giving any hackers who might know how to exploit it access to protected information systemwide. The Register reports that programmers are rushing to make the sweeping changes necessary to protect against the vulnerability on Linux and Windows operating systems, with such fixes required on macOS as well. Even worse, you can expect these vital updates to noticeably slow down your computer.

The design flaw in Intel's x86-64 hardware—first introduced in 2004 and still in use in the lion's share of modern-day processors—allows programs without the proper permissions to access the part of an operating system known as the kernel, a low-level chunk of code that controls literally everything in your system.

The exact details of the vulnerability are still somewhat under wraps, but as The Register has pieced together from multiple, technical sources, it appears the flaw is based in a feature called "speculative execution." This trick allows a processor to do things before it's absolutely sure they need to be done, so the results are ready as quickly as possible if needed and simply ignored if not. In Intel's x86-64 hardware, however, it appears that programs may be able to speculatively execute code they would not have permission to run under normal circumstances, allowing carefully-constructed, malicious code to essentially read your entire operating system's mind without the proper permission. The potential bounty of such an attack includes passwords, login files, and pretty much anything you'd ever want to keep secret.

It's hard to zero in on the most troubling part of this flaw. Intel's x86-64x processors are the most widely-used chips in virtually every form of laptop. If you don't know what processor you have, you almost certainly have one with this flaw. If you do have an AMD processor, however, congratulations—they are confirmed to be safe from the exploit.

In addition to the ubiquity of Intel processors, the low-level nature of this vulnerability means that hackers who may have learned to exploit it would have access to an unprecedented number of machines. And considering x86-64 has been around and prevalent since 2004, possible hackers have had access for over 10 years. No researchers have yet come forward with an example program that exploits this flaw, but that's hardly proof that hackers, or the NSA, didn't figure out how to make use of this exploit years ago.

On top of it all, the fix requires extremely deep and wide-reaching changes at the root levels of an operating system's software—changes that could impact performance of Intel machines by as much as 30 percent. The only alternative? A new computer with a different processor, or one powerful enough to make up for the performance hit. Even worse, these performance hits won't just come to your computer, but also the army of distant servers that run countless internet-connected services in the cloud.

So what can you do? Not much. If you have a computer with a competing AMD processor, pat yourself on the back and breathe easy. Otherwise, make sure that your computer's operating system is up to date with the latest security updates, though fixes for this particular problem may not be widely available for days or even weeks. Intel has yet to publicly comment on the vulnerability, but the consequences will likely reverberate for years.


TOPICS: Computers/Internet; Education; History; Society
KEYWORDS: cpu; flaw; hack; intel; intelprocessors; windowspinglist
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-111 next last
To: Swordmaker

my question is- being computer illiterate nearly- what exactly would the hackers be getting off a typical Internet and email user’s computers that is so valuable? All i basically do is Internet browsing and email with only a very few contacts really- it’s not like there is a whole slew of ‘valuable personal info’ on the computer


81 posted on 01/03/2018 8:36:51 PM PST by Bob434
[ Post Reply | Private Reply | To 73 | View Replies]

To: Red Badger

WOO-HOO, AMD Phenom II!


82 posted on 01/03/2018 9:00:25 PM PST by matthew fuller (Out with Jeff- In with Rudy!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Spktyr
A similar exploit has been found in AMD processors.
https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits

I'd use the term "vulnerability" instead of "exploit" because no exploit has actually been demonstrated for either "Meltdown" or "Spectrum."

83 posted on 01/03/2018 9:58:39 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 77 | View Replies]

To: dayglored
Does that apply to all supported versions, or only High Sierra? I.e. Has Apple rolled out fixes for older versions, -or- will older versions get a fix in the future, -or- does this force us all to upgrade?

I got sidetracked when I was posting the ping. It's only macOS 10.13.2 and later at this Time. Hopefully, they will patch earlier versions with a minor upgrade to just fix this.

84 posted on 01/03/2018 10:00:33 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 74 | View Replies]

To: SgtHooper
And it seems, according to the wording, that the “physical” stuff only applies to the AMD and ARM chips.

You've pretty much got it. . . a properly crafted app can force something into the look-ahead process to run something malicious.

85 posted on 01/03/2018 10:04:30 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 75 | View Replies]

To: Bob434
my question is- being computer illiterate nearly- what exactly would the hackers be getting off a typical Internet and email user’s computers that is so valuable? All I basically do is Internet browsing and email with only a very few contacts really- it’s not like there is a whole slew of ‘valuable personal info’ on the computer

Passwords, credit cards you may use, SSN. etc.

86 posted on 01/03/2018 10:07:01 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 81 | View Replies]

To: WayneS
I smell a lawsuit...

Absolutely...and I already know the outcome...

Lawyers receive hundreds of millions in fees.

End user plaintiffs will receive coupons for 10% off next purchase.

87 posted on 01/04/2018 5:06:42 AM PST by Prov1322 (Enjoy my wife's incredible artwork at www.watercolorARTwork.com! (This space no longer for rent))
[ Post Reply | Private Reply | To 3 | View Replies]

To: Prov1322

That sounds about right.


88 posted on 01/04/2018 5:47:28 AM PST by WayneS (An appeaser is one who feeds a crocodile, hoping it will eat him last. - Winston Churchill)
[ Post Reply | Private Reply | To 87 | View Replies]

To: Red Badger; All

Does this also affect the latest Coffee Lake processors?


89 posted on 01/04/2018 6:05:44 AM PST by PreciousLiberty (Make America Greater Than Ever!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Neanderthal

You may be thinking of the flaw from last year..............


90 posted on 01/04/2018 6:08:08 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 39 | View Replies]

To: PreciousLiberty

That I do not know..............


91 posted on 01/04/2018 6:08:36 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 89 | View Replies]

To: Bob434

It came on at the speed of light!............


92 posted on 01/04/2018 6:09:29 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 80 | View Replies]

To: HP8753

This is hardware, not software. MS is innocent.............this time.....................


93 posted on 01/04/2018 6:10:46 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 71 | View Replies]

To: ConservativeMind; IndispensableDestiny

Mine was a speed demon.....10 MHz!.................whooo-hoooo!.................


94 posted on 01/04/2018 6:12:40 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 68 | View Replies]

To: PreciousLiberty

This may answer your question:

from FReeper swordmaker’s post #64:

Mitigations by Linux code-base maintainers are underway, as are changes by Microsoft to protect Windows users. In response to a query, Microsoft told AppleInsider that they had no comment on a timetable of a release to fix the security flaw at this time, but kernel memory handling was altered by the company in Windows 10 beta builds in the end of 2017.


95 posted on 01/04/2018 6:17:29 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 89 | View Replies]

To: mrsmith

Or North Korea or Iran or Russia or............


96 posted on 01/04/2018 6:24:06 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 58 | View Replies]

To: BereanBrain

That’s what I was thinking, but the old aphorism is, “”Never attribute to malice that which is adequately explained by stupidity.” .........................


97 posted on 01/04/2018 6:27:15 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 70 | View Replies]

To: usconservative

https://www.reuters.com/article/us-cyber-intel/security-flaws-put-virtually-all-phones-computers-at-risk-idUSKBN1ES1BO


98 posted on 01/04/2018 6:29:41 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 66 | View Replies]

To: matthew fuller

https://www.reuters.com/article/us-cyber-intel/security-flaws-put-virtually-all-phones-computers-at-risk-idUSKBN1ES1BO


99 posted on 01/04/2018 6:31:59 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 82 | View Replies]

To: matthew fuller

https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits


100 posted on 01/04/2018 6:34:08 AM PST by Red Badger (Road Rage lasts 5 minutes. Road Rash lasts 5 months!.....................)
[ Post Reply | Private Reply | To 82 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-111 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson