Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Kernel panic! What are Meltdown and Spectre, the bugs affecting nearly every computer and device?
Tech Crunch ^ | 1/3/18 | Devin Coldewey

Posted on 01/03/2018 6:43:24 PM PST by markomalley

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 last
To: crusher2013
Is this actually a dangerous exploit or is it hype?

Hype. The exploitation of the flaws requires hostile user mode code. There are claims being kicked around that the user mode code could include javascript but that is BS. Javascript was never able to accomplish rowhammer and won't accomplish this exploit either because it can't run arbitrary instructions.

However if you click on an exe, designed by a hacker, containing instructions to allow kernel memory to be read from user mode, then you are screwed. But you were screwed when you clicked on the exe because it can do plenty of damage in plain old user mode. So it doesn't really matter.

41 posted on 01/04/2018 5:54:11 AM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Swordmaker
It STILL requires physical access to your Mac to install firmware to exploit this vulnerability

Yes, though technically that firmware fix closes many other doors as well. It is not just for the IPT flaws mentioned in this article.

42 posted on 01/04/2018 5:57:39 AM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Swordmaker
It STILL requires physical access to your Mac to install firmware to exploit this vulnerability

Yes, though technically that firmware fix closes many other doors as well. It is not just for the IPT flaws mentioned in this article.

43 posted on 01/04/2018 5:57:40 AM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 33 | View Replies]

To: crusher2013

But I should have also mentioned that the virtual server providers like Amazon, MS and others are concerned because their users can run arbitrary code by design. A hostile user of one of their services has the potential to impact the service or other users of the service when they should be isolated. So it is not hype for them.


44 posted on 01/04/2018 6:05:12 AM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 41 | View Replies]

To: markomalley

Bkmk


45 posted on 01/04/2018 6:08:20 AM PST by AllAmericanGirl44
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Thanks, SM.


46 posted on 01/04/2018 6:27:49 AM PST by conservatism_IS_compassion (Presses can be 'associated,' or presses can be independent. Demand independent presses.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: markomalley; rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; ...

47 posted on 01/04/2018 7:08:49 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

But Y2K was the problem worth throwing billions of dollars at.


48 posted on 01/04/2018 8:04:00 AM PST by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ...
Meltdown and Spectre ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to ShadowAce for the ping!

49 posted on 01/04/2018 3:10:13 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 47 | View Replies]

To: markomalley

[[Bottom line: there are vulnerabilities that are hard-wired into the actual hardware of the computers. This impacts everybody — Apple, Windows, Linux, Android, IOS, everything.]]

The exploits rely on users executing malicious code, right? If the code is windows based (mostly) then how would linux users be affected? (I’m sure some linux codes could be written, but I would think mostly windows code will be written as most people use windows?)

[[And that will take time and will require your hardware to be updated with the new CPU chips.]]

Which —should be— financed by the chipmakers as a recall considering how much money people spent in good faith on processors of a certain speed- only to later find out the speed will be cut by perhaps 30%?


50 posted on 01/04/2018 5:38:56 PM PST by Bob434
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Why WHY did I ever get rid of my Tandy Color Computer??
Motorola 6809 processor is not affected!


51 posted on 01/04/2018 5:47:39 PM PST by Dalberg-Acton
[ Post Reply | Private Reply | To 1 | View Replies]

To: palmer

[[However if you click on an exe, designed by a hacker, containing instructions to allow kernel memory to be read from user mode, then you are screwed. But you were screwed when you clicked on the exe because it can do plenty of damage in plain old user mode. So it doesn’t really matter.]]

Suppose that did happen, woudl system restore be able to undo the damage? (There is a program called rollbackRX which is a form of system restore on steroids- it works at boot level before the OS loads, so it could rollback a system to before the malicious code was executed)


52 posted on 01/04/2018 5:49:20 PM PST by Bob434
[ Post Reply | Private Reply | To 41 | View Replies]

To: Bob434
That's a great question. A user mode attack will have a lot of trouble persisting because it needs to write stuff to protected system files like the registry and there will be a UAC turning the screen black asking if you want so-and-so program to muck with the registry. Hopefully most people would say no if they were not installing something and expecting that dialog.

However, if you have patched or otherwise do not have this new Intel (perhaps AMD and ARM too) vulnerability, then the user mode malware that you accidentally ran will not be able to bypass UAC or otherwise muck with your system. Therefore you can grab the power cord and yank it out of the wall, and the threat is gone because it can't persist. Being able to persist more easily is just one of the threats from the Intel bug. But it requires malicious code to be running first. The bug does not let hackers in, or create a backdoor, or do anything else to make it easier to initially attack your computer. It only makes things easier after the initial attack is successful.

53 posted on 01/04/2018 6:23:03 PM PST by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 52 | View Replies]

To: snarkpup
AMD's Response

Variant One -- Bounds Check Bypass:

Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant Two -- Branch Target Injection:
Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three -- Rogue Data Cache Load
Zero AMD vulnerability due to AMD architecture differences.

I'm not sure what to make of the "near zero risk" for Variant Two.

54 posted on 01/05/2018 6:09:50 PM PST by TChad
[ Post Reply | Private Reply | To 21 | View Replies]

To: perfect_rovian_storm

https://www.freerepublic.com/focus/f-chat/3619893/posts


55 posted on 01/05/2018 6:47:36 PM PST by TexasGator (Z)
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson