After initial reports suggested a new security flaw was confined to Intel systems, researchers have now disclosed that nearly all modern processors are affected.
Security researchers have disclosed two new exploits that can be executed against modern processors. Dubbed "Meltdown" and "Spectre," the exploits use similar methods to impact processors from Intel, AMD and ARM across PCs, mobile devices and in the cloud. The researchers explain:
Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.
Meltdown and Spectre are distinct attacks, but they both allow attackers to break isolation between applications to access information. Perhaps the biggest difference, however, is the specific processors affected by each attack. Meltdown, the researchers say, has only been assessed to impact Intel processors. However, the range of potentially affected processors is vast:
More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether ARM and AMD processors are also affected by Meltdown.
Spectre, on the other hand, appears to have a much wider reach. According to researchers, nearly every type of device is affected by Spectre; it has been verified to work across Intel, AMD and ARM processors. Spectre is harder to exploit than Meltdown, but researchers caution that it is also harder to guard against. The attacks also work against cloud servers, which could leave customer data vulnerable.
Fortunately, at least some fixes are in the wild or on the way. For Google's part, it has an FAQ listing the status of its products and how they're affected:
- Google says it has patched the vulnerabilities in the January security patch for Android devices.
- Chromebooks running ChromeOS version 63 or later (which started rolling out December 15, 2017) are patched.
- Version 64 of the Chrome browser, due to release this month, "will contain mitigations to protect against exploitation."
- Google Home, Chromecast, Google Wifi and Google OnHub are all listed as "no additional user action needed."
- G Suite (Google Apps) has been fixed on the back end and requires no user interaction.
There are patches against Meltdown for Linux, Windows, and macOS. Spectre is not an easy fix, it seems, and the researchers say that there is ongoing work to "harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre."
You can read more on Spectre and Meltdown, including more technical details, in the researchers' full report.
from Android Central - Android Forums, News, Reviews, Help and Android Wallpapers http://ift.tt/2lRdTCB
via IFTTT
No comments:
Post a Comment