These exploits don't seem to be able to take control of systems, alter >protected or system memory or proccesses (or even user-space memory or >files?), plant or install back doors or other forms of persistent
access. Yes?
Is there a definative list of CPU models that are affected by Spectre / Meldown?
The most "detailed" explanation I can find is:
"every processor since 1995 (except Intel Itanium and Intel Atom before 2013)" is affected by Meltdown"
==============
I'd like to see a complete breakdown of the status of all Intel CPU's,
going back to at least the SLOT-1 products and including socket 370,
socket 478 and socket 775.
Also, what is status of Zeon CPU's, specifically socket 775-compatible ones?
Other questions:
These exploits don't seem to be able to take control of systems, alter protected or system memory or proccesses (or even user-space memory or files?), plant or install back doors or other forms of persistent
access. Yes?
These exploits make it possible for specifically-crafted code to be able
to read system memory (ie - memory / data that they wouldn't normally
have access to) but not necessarily be able to alter or corrupt said
memory? Yes?
Other than executing a binary delivered via email, is it possible to
deliver a workable Spectre / Meltdown exploit in the form of a script
written in any of the various web/browser compatible formats (JS, Java,
html, etc)?
I'd like to see a complete breakdown of the status of all Intel CPU's,
going back to at least the SLOT-1 products and including socket 370,
socket 478 and socket 775.
Unlikely that there will be such a list. All cpus are affected.
It provides read access to tiny amounts of data at a time. Given the multi-processor/multi-threading of processors, the volume of data the
exploit would have to sift through to find any thing of use, is massive.
David W. Hodgins wrote:
I'd like to see a complete breakdown of the status of all Intel CPU's,
going back to at least the SLOT-1 products and including socket 370,
socket 478 and socket 775.
Unlikely that there will be such a list. All cpus are affected.
Well, they do say that anything prior to 1995, and (in the case of Intel Atom) prior to 2013. I have some Atom-powered netbooks that would
therefore not be vulnerable.
It provides read access to tiny amounts of data at a time. Given the
multi-processor/multi-threading of processors, the volume of data the
exploit would have to sift through to find any thing of use, is massive.
That's one thing I don't understand, based on current reports.
Do operating systems of any or all sorts keep passwords in "special", strategic or universally-accepted locations in RAM such that sifting
through gb worth of memory dump would not be required?
To just even go about excercising the vulnerability, would the required
code be so specifically crafted such that the exact model/type of CPU
AND the particular OS would both be needed to be known in order for the
code to perform the intended memory dump operation?
Would there be any quirks of particular operating systems that would
render this vulnerability of little or no value, because of workability issues? I'm thinking of differences between, say, Win-9x/me vs any of
the NT-based Windoze. Differences in how memory is used by the kernel,
etc.
I don't believe that win-9x/me has any notion or ability to separate
memory access between applications, and I've never heard of any sort of "password" attack or comprimize that is specific to 9x/me that has any relavence to a user system.
It provides read access to tiny amounts of data at a time. Given the
multi-processor/multi-threading of processors, the volume of data the
exploit would have to sift through to find any thing of use, is massive.
Given this description of seeing full urls, etc, I take it back. It is
a critical problem, that will have be be mitigated asap.
David W. Hodgins wrote:
Given this description of seeing full urls, etc, I take it back. It is
a critical problem, that will have be be mitigated asap.
If I read that article correctly, they haven't actually tested the
exploit against processors made earlier than 2011.
That leaves a lot of socket 478/775 cpu's as yet to be proved vulnerable.
I would think that speculative execution is a "quirky" function in a
CPU, and that exactly how it operates depends a great deal on the
specific CPU die we're talking about, and possibly the microcode
revision it has?
I would love to see an on-line proof-of-concept test for this.
Naturally, something "white-hat" in nature. Barring that, a safe, downloadable executable.
If a meltdown exploit is running on a PC, wouldn't windows firewall
prevent out-bound communication of meltdown-derived data from an
infected PC to the outside world?
Sysop: | DaiTengu |
---|---|
Location: | Appleton, WI |
Users: | 993 |
Nodes: | 10 (0 / 10) |
Uptime: | 214:53:52 |
Calls: | 12,972 |
Files: | 186,574 |
Messages: | 3,268,551 |