Go | New | Find | Notify | Tools | Reply |
Member |
As someone had mentioned more than likely it was a backdoor for the US Government, but got discovered as a hardware security problem. God Bless "Always legally conceal carry. At the right place and time, one person can make a positive difference." | |||
|
Member |
If only you could have found a way to include the acronym TARDIS in your explanation. | |||
|
Don't Panic |
I know you were joshing, but this wouldn't be a really useful backdoor. As I understand it, it's like a janitor in an office not emptying the shredder's wastebasket reliably and there's a risk someone could get a snapshot of what's in the wastebasket. There might be useful bits in there occasionally, and it is a risk, but that's not reliable enough for a real spook. | |||
|
Member |
Meltdown only effects Intel processors (roughly every x86 / x86_64 processor since 1995 I think) and is due to a design "flaw" in the hardware. The flaw allows processes to access information in memory that they shouldn't have access to. The patches to fix this will introduce a performance penalty - which is more likely only seen with server / heavy loads. Systems with heavy I/O load, high volume of transactions or hosting virtual machines, etc. You're not going to see a performance degradation in your email or office documents. The Spectre vulnerability affects Intel, AMD, and ARM processors (so basically all modern devices), but the affects may not be to the same level between the 3 families of processors (least according to wikipedia). It sounds like the exploit is mostly theoretical at this point, working mostly just between user level applications - but likely that the risk will be greater once the exploits attacking this vulnerability mature. Spectre main risk sounds to be its impact on cloud providers as it allows the exploits to escape from a VM to the host OS (travel through the hyperviser) -- though I believe that type of exploit (escaping the hypervisor) has been known to be possible for at least 7 years (but maybe I'm wrong - I'm just recalling the "Blue Pill" vulnerability). | |||
|
Member |
That "backdoor" was more likely the Intel Management Engine vulnerability that broke in Nov 2017. Basically a Minix OS within the processor that lets you do out of band updates / maintenance on the PC without the host OS's knowledge - ie even when the PC is 'off', but the power is still plugged in. | |||
|
Member |
^ this is correct. There is a security hole but the use case is quite obscure, and only observed theoretically. | |||
|
Republican in training |
This affects every Intel CPU and also Windows, Linux, VMWare hypervisor, OSX and who knows what. "Spectre" affects AMD, Intel, ARM cpu's. "Meltdown" is specific to Intel cpu's. For Windows on Intel CPU's, you need both an OS patch, AND a motherboard BIOS update to be "fixed". There are also browser patches available. This affects VMWare/hypervisors in a way that if one virtual machine is compromised, the attacker could then gain access (access to read only as far as I know, not take control of) to all of the virtual machines that are residing on the host (not important to know for you home users - but this is why they say it affects the "cloud"). There are also MS SQL server specific patches. Also, you need to make sure your Antivirus supports the Microsoft patch before installing. If you don't have a specific registry key in Windows - Microsoft will not present the patches to you. As someone who works in IT with 30 or more VMWare hosts running 600 virtual machines and a few hundred random physical servers to boot - hold me. "We may all be killed" (in Jack Nance's voice) -------------------- I like Sigs and HK's, and maybe Glocks | |||
|
Powered by Social Strata | Page 1 2 |
Please Wait. Your request is being processed... |