Thursday, January 4, 2018

Intel CPU Design Flaw

Overview

A design flaw recently discovered in Intel microprocessors has Linux and Microsoft Windows developers reworking their kernels to defend against exploitation of the security bug. Its been speculated that the OS updates ultimately could slow performance of the systems, in some cases by 5 to 30%. Newer Intel processors aren't as susceptible to a performance impact.

With respect to the above flaw security Researchers from Google’s project zero and other universities discovered critical flaws in a method used by most modern processors for performance optimization that could allow an attacker to read sensitive system memory, which could contain passwords, encryption keys, and emails, for example. The vulnerabilities affect CPUs (processor) from Intel, AMD, and ARM released since 1995. Its been also noted  that tests on virtual machines used in cloud computing environments extracted data from other customers using the same server.

Technical Attack Summary

The actual flaws reside in a technique called "speculative execution" that is employed by all modern CPUs. This is a basic optimization technique that processors employ to carry out computations for data they "speculate" may be useful in the future. A way to use speculative execution  was discovered to read data from the CPU's memory that should have not been available for user-level apps. Three flaws were discovered that were combined in two attacks, named Meltdown (CVE-2017-5753 and CVE-2017-5715) and Spectre (CVE-2017-5754)

Meltdown: It breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system.

Spectre: It breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre.

The Affect Overview

All major chipset vendors (Intel, AMD, ARM), all major operating systems (Windows, Linux, macOS, Android, ChromeOS), cloud providers (Amazon, Google, Microsoft), and application makers.  These issues as hardware bugs that will need both firmware patches from CPU vendors and software fixes from both OS and application vendors.

Affected by Meltdown:
  • Every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013) is affected by Meltdown.

Affected by Spectre:
  • Spectre affects Intel, AMD, and ARM processors, and the attack affects desktops, laptops, cloud servers, and smartphones

What Is Affected
  • Servers
  • Workstations
  • Laptops
  • Cell phones
  • Tablets
  • Smart TVs
  • IoT devices
  • Other devices with affected CPUs

Patches Coming Up


  • Linux maintainers have already shipped versions of the Linux kernel containing the said fixes
  • Microsoft providing software and firmware updates to mitigate the attacks, but only for Windows Insiders builds, with patches for  mainstream Windows branches expected next week( Patch Tuesday)
  • Apple reportedly patched the issue in macOS 10.13.2
  • Cloud providers such as Google, Amazon, and Microsoft are set to patch issues this and next week.
  • Intel will soon provide the software and firmware updates to mitigate the attacks.
  • ARM also released fixes for variant affected by spectre.
  • Android patches are already released.

No comments:

Post a Comment