Jump to content

SUBIECTE NOI
« 1 / 5 »
RSS
schema pcb ELECTRA CIM150 PAS

Probleme stomac

Sfat achizitie bicicleta oras

Canalele Sky Showtime 1 și S...
 Recomandare anvelope lexus rx

Extindere rețea wireless int...

Configuratie PC

Mufa TV
 PPC Energy

Camera conferinta Tenveo tevo-vl12u

Recomandare rulouri exterioare us...

Gaoyue 858
 Telefon performant pe parte audio...

Aspecte legale https://registratu...

Filtru de apa curata apa de miner...

Unde gasesc borcane mari 5 - litr...
 

Intel CPU - Design flaw in fiecare procesor din ultimii 10 ani

* * * * - 7 votes
  • Please log in to reply
1561 replies to this topic

#1513
ro_explorer

ro_explorer

    Membru impartial

  • Grup: Senior Members
  • Posts: 29,664
  • Înscris: 15.12.2009
Sistemele sunt cu siguranta patchuite caci sunt prea multi bani in joc. De ce ar face Amazon asta ce? E sistem clasic de securitate in aplicatii industriale. Singurul mod de a extracge date este sa fii prezent fizic la locatia unde e clusterul, sa stii exact unde ruleaza la un moment dat ceva anume si sa aplici exploitul local ...

Sunt vulnerabilitati si vulnerabilitati. Ce tot apare in ultima vreme este mai mult media si mai putin impact real asupra functionalitatii.

#1514
xeleron

xeleron

    Suflet de campion...

  • Grup: Senior Members
  • Posts: 23,709
  • Înscris: 01.01.2008
Ro, ăla cu acces local e Spectre nu meltdown.

#1515
ro_explorer

ro_explorer

    Membru impartial

  • Grup: Senior Members
  • Posts: 29,664
  • Înscris: 15.12.2009
Da mai, stiu. Spuneam ca intr-o ferma industriala sansa ca VM-ul tau sa fie pe acelasi host fizic cu un anume VM de unde vrei sa extragi date este aproape nula.

#1516
xvmhunt

xvmhunt

    Junior Member

  • Grup: Members
  • Posts: 213
  • Înscris: 08.01.2019
Cat timp asteapta armata rosie cu limba scoasa sa fure meltdown-ul macar parola lui Gheorghe Zidarul, na belea! Posted Image

Edited by xvmhunt, 23 March 2019 - 04:44.


#1517
xeleron

xeleron

    Suflet de campion...

  • Grup: Senior Members
  • Posts: 23,709
  • Înscris: 01.01.2008
Ca o paranteză, o vulnerabilitate asemănătoare cu Spectre a fost folosită împotriva PS4 (un firmware anterior) care a permis utilizatorului să decripteze un dump de kernel al acestuia, iar de aici calea a fost aproape liberă. Mai nou au reușit să ruleze linux pe el.

#1518
shmu

shmu

    Clickahoolic

  • Grup: Senior Members
  • Posts: 16,460
  • Înscris: 09.01.2008

View Postxeleron, on 22 martie 2019 - 17:45, said:

Chiar și ca utilizator casnic, conceptul a fost demonstrat ca fiind fezabil cu javascript, ceea ce înseamnă că un ad inocent de pe un tab trage datele tale bancare de pe tabul cu emag (și dacă ai cumva impresia că 2fa este infailibil, ei bine nu e ).
nu prea are ce sa traga. nu salvez cardu online.
in plus, pot apela la chargeback.
in plus, daca fura datele de conectare la net banking, nu prea are ce sa faca decat sa plateasca facturi...

#1519
JohnnyUSA

JohnnyUSA

    Active Member

  • Grup: Members
  • Posts: 1,021
  • Înscris: 27.01.2006
Asta incerc si eu sa spun, prea mult bla bla.
Intr-un an de zile ar fi trebuit sa se intample o nenorocire la cat marketing se face vis-a-vis de Spectre si Meltdown. NU AM CITIT NIMIC.

Doar teorii ale conspiratiei, ceva palpabil, NADA ..as in 0.

Chiar daca nu sunt detectabile cum spuneti voi, pagube trebuie sa existe, nu? Unde sunt? Intr-un sistem adus la zi din toate punctele de vedere, cu sisteme de protectie serioase, in momentul in care se intampla o nenorocire, luand lucrurile prin eliminare ar trebui sa ajungi sa dai vina pe Spectre/Meltdown.. cu toate astea, ma repet, nu am dat inca de o nenorocire cauzata de inculpatii de serviciu.

#1520
SEPTEMBER9

SEPTEMBER9

    Member

  • Grup: Members
  • Posts: 433
  • Înscris: 21.11.2018
CPU: Intel Core i7-5820K Haswell-E
MB: Gigabyte X99-UD4

Am facut update la BIOS. La versiunea F24c. Mai trebuie sa fac altceva? Trebuie vreun firmware pt. procesor?
Deci nu prea ma pricep. Ce trebuie sa mai fac?
Multumesc.

#1521
sys

sys

    Active Member

  • Grup: Members
  • Posts: 1,961
  • Înscris: 27.03.2010
Folosesti inspectre si vezi daca esti protejat. https://www.grc.com/inspectre.htm

#1522
FeDaYin

FeDaYin

    Active Member

  • Grup: Members
  • Posts: 1,663
  • Înscris: 03.01.2007
Aplicatia aia a fost actualizata ultima data acum 1 an, au aparut multe alte vulnerabilitati de atunci. Ultimele update-uri la Windows sunt de ajuns sa stii ca nu esti afectat.

#1523
SEPTEMBER9

SEPTEMBER9

    Member

  • Grup: Members
  • Posts: 433
  • Înscris: 21.11.2018
Nu ma intereseaza ce vulnerabilitati au mai aparut! Pe mine ma intereseaza doar vulnerabilitatea despre care se vorbeste in acest thread.

Attached File  InSpectre.PNG   17.25K   9 downloads

#1524
FeDaYin

FeDaYin

    Active Member

  • Grup: Members
  • Posts: 1,663
  • Înscris: 03.01.2007
In acest thread nu se discuta despre o singura vulnerabilitate, sunt vreo 124 in ultimii 3 ani (momentan) https://www.cvedetai.../238/Intel.html

#1525
FeDaYin

FeDaYin

    Active Member

  • Grup: Members
  • Posts: 1,663
  • Înscris: 03.01.2007
ZombieLoad - Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack, Advises Disabling Hyper-Threading Below 8th, 9th Gen CPUs
https://www.techpowe...th-9th-gen-cpus
https://www.zdnet.co...channel-attack/

Personal nu sunt surprins ca inca apar vulnerabilitati.

#1526
Arthos

Arthos

    ¯\_(ツ)_/¯

  • Grup: Senior Members
  • Posts: 3,407
  • Înscris: 01.11.2004
Avem si site pentru noile vulnerabilitati : CPU.fail :>

Si anuntul official Graz University of Technology :

Following on from Meltdown and Spectre: TU Graz researchers discover new security flaws

Redhat : Understanding the MDS vulnerability: What it is, why it works and how to mitigate it


[ https://www.youtube-nocookie.com/embed/Oeb-O4yKK2c?feature=oembed - Pentru incarcare in pagina (embed) Click aici ]

Edited by Arthos, 15 May 2019 - 00:19.


#1527
Arthos

Arthos

    ¯\_(ツ)_/¯

  • Grup: Senior Members
  • Posts: 3,407
  • Înscris: 01.11.2004
Chrome OS 74 dezactiveaza Hyper-Threading pe Chromebook-uri:
https://www.chromium...mds-on-chromeos

Quote

Microarchitectural Data Sampling (MDS) is a group of vulnerabilities that allow an attacker to potentially read sensitive data.  If Chrome processes are attacked, these sensitive data could include website contents as well as passwords, credit card numbers, or cookies. The vulnerabilities can also be exploited to read host memory from inside a virtual machine, or for an Android App to read privileged process memory (e.g. keymaster)

Apple :How to enable full mitigation for Microarchitectural Data Sampling (MDS) vulnerabilities


Quote

The full mitigation, which includes disabling hyper-threading, prevents information leakage across threads and when transitioning between kernel and user space, which is associated with the MDS vulnerabilities for both local and remote (web) attacks.

Testing conducted by Apple in May 2019 showed as much as a 40 percent reduction in performance with tests that include multithreaded workloads and public benchmarks. Performance tests are conducted using specific Mac computers. Actual results will vary based on model, configuration, usage, and other factors.


https://mdsattacks.com/

Quote

Multiple teams and researchers independently discovered, studied, and reported MDS-class vulnerabilities and attacks to Intel. Unfortunately, the different timelines (see below), as well as the fine-grained vulnerability classification and embargo strategy enforced by Intel (which coordinated the disclosure process) made proper coordination across teams impossible. The year-long disclosure process (the longest to date) ultimately resulted in independent finders of even closely related MDS-class vulnerabilities to be completely unaware of one another until a few days before the May 14 disclosure date.

Edited by Arthos, 15 May 2019 - 09:34.


#1528
Mr_nobody_

Mr_nobody_

    Senior Member

  • Grup: Senior Members
  • Posts: 5,000
  • Înscris: 03.02.2017
Apar vulnerabilitățile ca ciupercile după ploaie:

Quote

ix@samsung:~$ grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, RSB filling

Să recapitulăm: Meltdown, Spectre V1, Spectre V2, Foreshadow, Speculative Store Bypass, Zombieload.
Ce mai urmează? Posted Image

Edited by Mr_nobody_, 15 May 2019 - 09:52.


#1529
MembruAnonim

MembruAnonim

    MembruAnonim

  • Grup: Banned
  • Posts: 398,284
  • Înscris: 08.10.2015
https://techcrunch.c...tel-processors/

faina treaba

New secret-spilling flaw affects almost every Intel chip since 2011

#1530
Arthos

Arthos

    ¯\_(ツ)_/¯

  • Grup: Senior Members
  • Posts: 3,407
  • Înscris: 01.11.2004
Se pare ca Intel a incercat o amanare a dezvaluire a vulnerabilitatilor cu inca 6 luni :
Original olandeza : https://www.nrc.nl/n...l-hart-a3960208
Google Translate : https://translate.go...l-hart-a3960208

Quote

There is a small taste to the premium. According to the VU, Intel tried to downplay the severity of the leak by officially paying $ 40,000 in rewards and in addition, "$ 80,000" off. That offer was politely refused.

Intel initially failed to notify Google and Mozilla, two major browser manufacturers.

The VU tried to force the manufacturer to come out faster.  Eventually the VU forced Intel to come out in May - otherwise the university would publish the details itself.  "If it were up to Intel, they would have wanted to wait another six months," says Bos.


Anunturi

Bun venit pe Forumul Softpedia!

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Forumul Softpedia foloseste "cookies" pentru a imbunatati experienta utilizatorilor Accept
Pentru detalii si optiuni legate de cookies si datele personale, consultati Politica de utilizare cookies si Politica de confidentialitate