The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
The Guiding Principles and New Rules document is now in effect.

Bad news for people with intel chips.

JastJast Registered User regular
edited August 2008 in Debate and/or Discourse
Inforworld article.
Researcher to demonstrate attack code for Intel chips

Kaspersky says CPU bugs are a growing threat, with malware being written that targets these vulnerabilities



By Sumner Lemon, IDG News Service

July 14, 2008


Security researcher and author Kris Kaspersky plans to demonstrate how an attacker can target flaws in Intel's microprocessors to remotely attack a computer using JavaScript or TCP/IP packets, regardless of what operating system the computer is running.



Kaspersky will demonstrate how such an attack can be made in a presentation at the upcoming Hack In The Box (HITB) Security Conference in Kuala Lumpur, Malaysia, during October. The proof-of-concept attacks will show how processor bugs, called errata, can be exploited using certain instruction sequences and a knowledge of how Java compilers work, allowing an attacker to take control of the compiler.

"I'm going to show real working code...and make it publicly available," Kaspersky said, adding that CPU bugs are a growing threat and malware is being written that targets these vulnerabilities.

Different bugs will allow hackers to do different things on the attacked computers. "Some bugs just crash the system, some allow a hacker to gain full control on the kernel level. Some just help to attack Vista, disabling security protections," he said.

The demonstrated attack will be made against fully patched computers running a range of operating systems, including Windows XP, Vista, Windows Server 2003, Windows Server 2008, Linux and BSD, Kaspersky said, adding that the demonstration of an attack against a Mac is also a possibility.

Processors contain hundreds of millions of transistors and errata in these chips are relatively common. While some errata can affect a chip's ability to function properly -- such as the errata that last year forced Advanced Micro Devices to push back volume shipments of its quad-core Opteron processors -- many others exist unnoticed by users.

For example, the Silverthorne version of Intel's Atom processor, which lies at the heart of the Centrino Atom chip platform, contains 35 errata, according to a June specification update released by Intel.

"It's possible to fix most of the bugs, and Intel provides workarounds to the major BIOS vendors," Kaspersky said, referring to the code that controls the most basic functions of a PC. "However, not every vendor uses it and some bugs have no workarounds."

Ok, this doesn't sound too good. The guy does sound kind of crazy, and is going about making his point the wrong way, (harr harr instead of just telling intel how to fix this I'm going to release this to the world so that hackers can take down thousands of computers a day!). Would it really be so hard to say, "Hey I found this totally massive security flaw, fix it!" It's almost akin to someone saying there's a flaw in a building's security then blowing it up to prove it.

Jast39.png
Jast on

Posts

  • DaedalusDaedalus Registered User regular
    edited August 2008
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Daedalus on
  • kdrudykdrudy Registered User regular
    edited August 2008
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    And not only with they deny it exists, but they will probably sue you over it.

    kdrudy on
    tvsfrank.jpg
  • DaedalusDaedalus Registered User regular
    edited August 2008
    kdrudy wrote: »
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    And not only with they deny it exists, but they will probably sue you over it.

    Yeah. Sometimes a researcher will hold off on making the explot public until a set time, to give people a chance to get patched, but invariably a bunch of retarded corporate entities don't fucking bother until the exploit is found in the wild. And sometimes the bad guys independently figure out the problem in the meantime. See also: the recent DNS vulnerability (which honestly was a good deal scarier).

    Daedalus on
  • BlackDragon480BlackDragon480 Bluster Kerfuffle Master of Windy ImportRegistered User regular
    edited August 2008
    Hmm, glad I run AMD.

    BlackDragon480 on
    No matter where you go...there you are.
    ~ Buckaroo Banzai
  • ege02ege02 __BANNED USERS regular
    edited August 2008
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Umm, that's not how things work in the "computer security world." When you find a bug you're supposed to take it to the developer, not disclose it to the public. And they can't deny it, because if they do and then someone takes advantage of the flaw, they can be held liable for willful ignorance and the damages caused.

    ege02 on
  • DaedalusDaedalus Registered User regular
    edited August 2008
    ege02 wrote: »
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Umm, that's not how things work in the "computer security world." When you find a bug you're supposed to take it to the developer, not disclose it to the public. And they can't deny it, because if they do and then someone takes advantage of the flaw, they can be held liable for willful ignorance and the damages caused.

    You live in an interesting ideal world. What's the weather like?

    Daedalus on
  • RoundBoyRoundBoy Registered User regular
    edited August 2008
    'normal' researchers disclose the bug to the original party, and give them the chance to have a patch ready for when they release the exploit.

    they release because that gives an incentive for the company to do a patch, otherwise it may sit around for years...


    Wasn't there a patch for intel and windows ? I remember something in the last year or so I downloaded to patch a bug or exploit in the cpu code..

    RoundBoy on
    sig_civwar.jpg
    Librarians harbor a terrible secret. Find it.
  • DaedalusDaedalus Registered User regular
    edited August 2008
    RoundBoy wrote: »
    'normal' researchers disclose the bug to the original party, and give them the chance to have a patch ready for when they release the exploit.

    they release because that gives an incentive for the company to do a patch, otherwise it may sit around for years...


    Wasn't there a patch for intel and windows ? I remember something in the last year or so I downloaded to patch a bug or exploit in the cpu code..

    If you look at the article, Intel already knows about the problem and provides BIOS fixes. Some motherboard vendors aren't implementing them, leaving their customers at risk.

    Daedalus on
  • ege02ege02 __BANNED USERS regular
    edited August 2008
    Daedalus wrote: »
    ege02 wrote: »
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Umm, that's not how things work in the "computer security world." When you find a bug you're supposed to take it to the developer, not disclose it to the public. And they can't deny it, because if they do and then someone takes advantage of the flaw, they can be held liable for willful ignorance and the damages caused.

    You live in an interesting ideal world. What's the weather like?

    Certified under CNSS here.

    And you?

    ege02 on
  • RoundBoyRoundBoy Registered User regular
    edited August 2008
    Daedalus wrote: »
    RoundBoy wrote: »
    'normal' researchers disclose the bug to the original party, and give them the chance to have a patch ready for when they release the exploit.

    they release because that gives an incentive for the company to do a patch, otherwise it may sit around for years...


    Wasn't there a patch for intel and windows ? I remember something in the last year or so I downloaded to patch a bug or exploit in the cpu code..

    If you look at the article, Intel already knows about the problem and provides BIOS fixes. Some motherboard vendors aren't implementing them, leaving their customers at risk.

    My reply wasn't to this issue, but to the exploit / patch cycle in general.

    Like I said, does it have to be a BIOS fix, or something the OS can implement? and dammit, I can't find the patch I applied sometime last year., or even a reference to it.

    RoundBoy on
    sig_civwar.jpg
    Librarians harbor a terrible secret. Find it.
  • DynagripDynagrip Break me a million hearts HoustonRegistered User, ClubPA regular
    edited August 2008
    ege02 wrote: »
    Daedalus wrote: »
    ege02 wrote: »
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Umm, that's not how things work in the "computer security world." When you find a bug you're supposed to take it to the developer, not disclose it to the public. And they can't deny it, because if they do and then someone takes advantage of the flaw, they can be held liable for willful ignorance and the damages caused.

    You live in an interesting ideal world. What's the weather like?

    Certified under CNSS here.

    And you?

    haha, wrong person to do this with.

    Dynagrip on
  • UrianUrian __BANNED USERS regular
    edited August 2008
    What are the cards affected, and where is the patch?

    Urian on
  • zeenyzeeny Registered User regular
    edited August 2008
    I'm more than confused here:
    Security researcher and author Kris Kaspersky plans to demonstrate how an attacker can target flaws in Intel's microprocessors to remotely attack a computer using JavaScript or TCP/IP packets, regardless of what operating system the computer is running.

    and then
    The proof-of-concept attacks will show how processor bugs, called errata, can be exploited using certain instruction sequences and a knowledge of how Java compilers work, allowing an attacker to take control of the compiler.

    Is he talking about JIT Compilers? Because there is just no fucking way he's saying you can exploit it with bytecode and I'm unable to make a connection between those two statements.
    Count me VERY sceptical that:
    - the attack is possible remotely.
    - it's anything more than a way to cause a buffer overflow in JIT compilers that doesn't actually use a CPU "bug".(the claim it's Intel specific would make no sense in that case though)
    I will also be keeping an eye on it as the implications could be pretty big.

    zeeny on
  • JaninJanin Registered User regular
    edited August 2008
    zeeny wrote: »
    I'm more than confused here:
    Security researcher and author Kris Kaspersky plans to demonstrate how an attacker can target flaws in Intel's microprocessors to remotely attack a computer using JavaScript or TCP/IP packets, regardless of what operating system the computer is running.

    and then
    The proof-of-concept attacks will show how processor bugs, called errata, can be exploited using certain instruction sequences and a knowledge of how Java compilers work, allowing an attacker to take control of the compiler.

    Is he talking about JIT Compilers? Because there is just no fucking way he's saying you can exploit it with bytecode and I'm unable to make a connection between those two statements.
    Count me VERY sceptical that:
    - the attack is possible remotely.
    - it's anything more than a way to cause a buffer overflow in JIT compilers that doesn't actually use a CPU "bug".(the claim it's Intel specific would make no sense in that case though)
    I will also be keeping an eye on it as the implications could be pretty big.

    From what I've heard, the researcher believes that with proper understanding of how the Javascript interpreter of a particular browser works, it's possible to construct bytecode that will execute machine code which exploits errors in the processor.

    I don't know how feasible an attack would be in real life, since it would require compromising almost the entire software stack. Furthermore, unless there's something big I'm missing here, this hole could be easily blocked by the browser and OS vendors.
    ege02 wrote: »
    Certified under CNSS here.

    And you?

    So you live in Government-land. In the real world, you tell a company about a bug in their software and they'll ignore it. Publicize that you've told them and they'll sue you. Publish the exploit and proof-of-concept and they'll downplay it as a feature. Maybe in a few months, if you're lucky, a patch will be snuck into a service pack.

    Janin on
    [SIGPIC][/SIGPIC]
  • DaedalusDaedalus Registered User regular
    edited August 2008
    ege02 wrote: »
    Daedalus wrote: »
    ege02 wrote: »
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Umm, that's not how things work in the "computer security world." When you find a bug you're supposed to take it to the developer, not disclose it to the public. And they can't deny it, because if they do and then someone takes advantage of the flaw, they can be held liable for willful ignorance and the damages caused.

    You live in an interesting ideal world. What's the weather like?

    Certified under CNSS here.

    And you?

    Civilian contractor with AFRL's IT research division, for now, but if you want to have an internet dickwaving contest you'll win by default since I can't talk about what I'm doing there.

    But luckily I don't have to, since it takes a cursory fucking glance at the news to support my point.

    Daedalus on
  • zeenyzeeny Registered User regular
    edited August 2008
    Janin wrote: »
    From what I've heard, the researcher believes that with proper understanding of how the Javascript interpreter of a particular browser works, it's possible to construct bytecode that will execute machine code which exploits errors in the processor.

    But that really shouldn't be possible. JVM implementations do not execute bytecode in the same way. Like, not at all.
    I'd agree that even if he can target a specific VM that would be bad enough, but I'm even more skeptical than before. Fully there with your assertion that even if this is possible, it should be trivial to block at least as far as remote exploits are concerned.

    zeeny on
  • Apothe0sisApothe0sis Have you ever questioned the nature of your reality? Registered User regular
    edited August 2008
    Daedalus wrote: »
    ege02 wrote: »
    Daedalus wrote: »
    ege02 wrote: »
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Umm, that's not how things work in the "computer security world." When you find a bug you're supposed to take it to the developer, not disclose it to the public. And they can't deny it, because if they do and then someone takes advantage of the flaw, they can be held liable for willful ignorance and the damages caused.

    You live in an interesting ideal world. What's the weather like?

    Certified under CNSS here.

    And you?

    Civilian contractor with AFRL's IT research division, for now, but if you want to have an internet dickwaving contest you'll win by default since I can't talk about what I'm doing there.

    But luckily I don't have to, since it takes a cursory fucking glance at the news to support my point.

    I like this thread.

    Apothe0sis on
  • JaninJanin Registered User regular
    edited August 2008
    zeeny wrote: »
    Janin wrote: »
    From what I've heard, the researcher believes that with proper understanding of how the Javascript interpreter of a particular browser works, it's possible to construct bytecode that will execute machine code which exploits errors in the processor.

    But that really shouldn't be possible. JVM implementations do not execute bytecode in the same way. Like, not at all.
    I'd agree that even if he can target a specific VM that would be bad enough, but I'm even more skeptical than before. Fully there with your assertion that even if this is possible, it should be trivial to block at least as far as remote exploits are concerned.

    This is the currently accepted wisdom, yes. If he manages to successfully exploit processor errata it will be a a true marvel.

    Also, the JVM runs Java, not Javascript.

    Janin on
    [SIGPIC][/SIGPIC]
  • Whiniest Man On EarthWhiniest Man On Earth Registered User regular
    edited August 2008
    Daedalus wrote: »
    ege02 wrote: »
    Daedalus wrote: »
    ege02 wrote: »
    Daedalus wrote: »
    If it was anybody but Kaspersky, I'd immediately call bullshit. That said, I'm worried. Of course, the news article glosses over the fact that only some specific Intel chips are affected, etc. Still worrying, though.

    Oh, and as to your question: this is how things work in the computer security world. If you don't disclose a vulnerability when you find it, the corporation responsible (Intel, in this case) will just deny it exists, even after the bad guys independently find and explot it. The only way to get a company to fix security flaws is to make them embarrasingly public. It's sad, but true.

    Umm, that's not how things work in the "computer security world." When you find a bug you're supposed to take it to the developer, not disclose it to the public. And they can't deny it, because if they do and then someone takes advantage of the flaw, they can be held liable for willful ignorance and the damages caused.

    You live in an interesting ideal world. What's the weather like?

    Certified under CNSS here.

    And you?

    Civilian contractor with AFRL's IT research division, for now, but if you want to have an internet dickwaving contest you'll win by default since I can't talk about what I'm doing there.

    But luckily I don't have to, since it takes a cursory fucking glance at the news to support my point.

    The winner and still champ-een!

    Also, I am really curious to see how this pans out.

    Whiniest Man On Earth on
  • ege02ege02 __BANNED USERS regular
    edited August 2008
    Daedalus wrote: »
    ege02 wrote: »
    Certified under CNSS here.

    And you?

    Civilian contractor with AFRL's IT research division, for now, but if you want to have an internet dickwaving contest you'll win by default since I can't talk about what I'm doing there.

    That's fine. This is not a pissing contest.
    But luckily I don't have to, since it takes a cursory fucking glance at the news to support my point.

    What point is that, and why are you attempting to support it with a news article from 2002? Mate, the legal landscape of information security has changed a lot in the past six years. The Bush administration since 2001 has reviewed hundreds of new regulations in this field alone, and every month new class action lawsuits are filed against corporate executives who stay willfully ignorant of security flaws in their products and systems.

    Yeah, it's true that among information security researchers it is common practice to give presentations and talk about newly discovered security flaws for research purposes. But this is very different than what you are suggesting, which is making the information "embarrassingly" public - the specific wording you used - with the justification that it is the only way to get a company to fix it. It is not, and it is not only unprofessional but also illegal. I mean, vigilantism is cool and all that, but it is not very practical - legally speaking - in the information security field.

    Here is a more recent - although I admit not recent enough still - news article that explains the kind of phenomenon I'm talking about. Excerpt:
    "A case could be made that [companies whose data is stolen] do have a responsibility," says Anita L. Allen, Henry R. Silverman professor of law at the University of Pennsylvania School of Law. Publicizing private facts about people is a tort, she says, and companies can be held liable even if the victim hasn't suffered a monetary loss. "If they recklessly failed to protect the information, that might be seen by a jury or judge as highly offensive conduct," she says.

    Mind you, this is just for failing to protect other people's private information. Can you imagine a case where they refused to take the necessary steps to protect it? Let me give you a hint: bad, bad things.

    ege02 on
  • DaedalusDaedalus Registered User regular
    edited August 2008
    I thought it was fairly clear in the article that Intel already had the information on these flaws and had released BIOS updates that some motherboard managers didn't bother to implement yet. Which, y'know, means that the relevant parties had information on the flaws and were failing to administer a fix. The people mentioned as being maybe liable in that article are the retail companies who had information stolen, not the software and hardware vendors (although if that was just the first article you grabbed, I understand).

    Speaking of which, the article I grabbed was the first one that happened to come up. If you want a recent example of what I'm talking about (thankfully without suing the guy who found the vulnerability; at least something's improving!), look at which DNS servers are still, right now, vulnerable to cache poisoning.
    and that little sideline-cheering thing was fucking creepy, guys. Cut it out.

    edit: and sorry if I seemed hostile at first; the whole "well, I've got a certificate" attitude in IT in general is something that's always rubbed me the wrong way, and I overreacted a bit.

    Daedalus on
  • ElkiElki get busy Moderator, ClubPA Mod Emeritus
    edited August 2008
    Apothe0sis wrote: »
    I like this thread.

    It's quality.

    Elki on
    smCQ5WE.jpg
  • Wonder_HippieWonder_Hippie __BANNED USERS regular
    edited August 2008
    Quick question, what generations of Intel procs do these exploits affect? I literally just today (tax-free woo!) went with somebody to Microcenter to get them their computer components, and included was an Intel quad-core proc.

    Wonder_Hippie on
  • JaninJanin Registered User regular
    edited August 2008
    Quick question, what generations of Intel procs do these exploits affect? I literally just today (tax-free woo!) went with somebody to Microcenter to get them their computer components, and included was an Intel quad-core proc.

    Not enough details given. The technique isn't specific to Intel either, it would theoretically affect all brands of processor, it's just that the researcher has chosen to single out Intel for some reason.

    Janin on
    [SIGPIC][/SIGPIC]
  • Wonder_HippieWonder_Hippie __BANNED USERS regular
    edited August 2008
    Janin wrote: »
    Quick question, what generations of Intel procs do these exploits affect? I literally just today (tax-free woo!) went with somebody to Microcenter to get them their computer components, and included was an Intel quad-core proc.

    Not enough details given. The technique isn't specific to Intel either, it would theoretically affect all brands of processor, it's just that the researcher has chosen to single out Intel for some reason.

    Is the Intel/AMD dynamic the same as it was... err... 5 years ago or so? God, it's been so long since I seriously kept up with PC technology. I need to build a new machine and catch the hell up.

    Wonder_Hippie on
  • zeenyzeeny Registered User regular
    edited August 2008
    Janin wrote: »
    zeeny wrote: »
    Janin wrote: »
    From what I've heard, the researcher believes that with proper understanding of how the Javascript interpreter of a particular browser works, it's possible to construct bytecode that will execute machine code which exploits errors in the processor.

    But that really shouldn't be possible. JVM implementations do not execute bytecode in the same way. Like, not at all.
    I'd agree that even if he can target a specific VM that would be bad enough, but I'm even more skeptical than before. Fully there with your assertion that even if this is possible, it should be trivial to block at least as far as remote exploits are concerned.

    This is the currently accepted wisdom, yes. If he manages to successfully exploit processor errata it will be a a true marvel.

    Also, the JVM runs Java, not Javascript.

    Well, technically, no. The JVM is pretty much a bytecode(read, assembly) interpreter and would run anything as long as the bytecode produced is valid. There are compilers for a lot of different languages.
    Your point is what I was getting to in my initial post. First in the article they mention Javascript and then they talk about VM's, which was genuinely perplexing. After your explanation on how it's supposed to work I thought they are going to construct bytecode on the fly, but still wasn't smarter as to why Javascript is the choice as a server language would make much more sense.
    Is the Intel/AMD dynamic the same as it was... err... 5 years ago or so? God, it's been so long since I
    seriously kept up with PC technology. I need to build a new machine and catch the hell up.

    What are you asking? If the architectures are still similar enough that reading the manual of one gives you a good idea about the other? If that's it, the answer is no.
    If your question was about performance, AMD still have cleaning up to do in their multi core CPU's.

    zeeny on
Sign In or Register to comment.