[轉錄][News] 無差別攻擊 intel CPU Bug將導致遠程代 …
※ [本文轉錄自 hardware 看板]
作者: coolcliff01 (神阿..好你個死人頭) 看板: hardware
標題: [News] 無差別攻擊 intel CPU Bug將導致遠程代碼攻擊
時間: Wed Jul 16 15:44:58 2008
轉載自 http://tinyurl.com/5n9v95
這是一個intel CPU的漏洞所導致的一個弱點!
可能會被用來進行遠端攻擊,受影響的作業系統為"任何"
這是一種很有趣的攻擊方式
是針對特定硬體的而來的弱點攻擊!而且沒有限定作業系統
不管是Windows,Linux,BSD等都有可能經由這個弱點被攻擊!
而Kris Kaspersky(Kaspersky安全研究員)表示他計劃將在今年10月所舉行的HITB
展示這個弱點攻擊,並說明如何利用CPU Bug來達攻擊的目的!
*****************************************************************
Presentation Title: Remote Code Execution Through Intel CPU Bugs
Presentation Abstract:
According to the Intel Specification Updates, Intel Core 2 has 128 confirmed
bugs. Intel Itanium (designed for critical systems) looks more 「promising」,
carrying over 230 bugs. They have all been confirmed by Intel and described
in errata section of their specification updates. Some bugs 「just」 crash
the system (under quite rare conditions) while the others give the attackers
full control over the machine. In other words, Intel CPUs have exploitable
bugs which are vulnerable to both local and remote attacks which works
against any OS regardless of the patches applied or the applications which
are running.
Although CPU bugs are not something new in the security industry, nobody has
come out with any proof-of-concept exploits and as it stands, there are no
known malware that take advantage of these bugs, although some malware
writers have actually used CPU bugs for targeted attacks. It is just a matter
of time before we start seeing these sort of attacks used in more devastating
ways over the Internet. Intel has provided workarounds to major BIOS vendors
for some of these bugs, but who knows which vendor actually uses them?
End-users are in the dark as to how to check if they are secure or not. Intel
doesn't provide any test program for this and the worst thing is - some bugs
are still not fixed. In other words, Intel has no workaround for it.
In this presentation, I will share with the participants the finding of my
CPU malware detection research which was funded by Endeavor Security. I will
also present to the participants my improved POC code and will show
participants how it's possible to make an attack via JavaScript code or just
TCP/IP packets storms against Intel based machine. Some of the bugs that will
be shown are exploitable via common instruction sequences and by knowing the
mechanics behind certain JIT Java-compilers, attackers can force the compiler
to do what they want (for example: short nested loops lead to system crashes
on many CPUs). I will also share with the participants my experience in data
recovery and how CPU bugs have actually contributed in damaging our hard
drives without our knowledge.
About Kris
Kris Kaspersky has over 15 years of software engineering and reverse
engineering experience in CD/DVD protections, PE/ELF packers/protectors,
CD/DVD copiers, audio/video codecs (MPEG 1/MPEG 2/MPEG 4), data flow
optimization, CPU-specific optimization, compiler specific optimization,
debugging code and much more. As an independent consultant and technical
writer, Kris has been an active researcher in the field of reverse
engineering and pretty much dedicated his daily life in mastering the art. He
possesses a deep knowledge in OS internals and low level ASM. He is also the
author for Xakep magazine and has published more than 20 books about system
programming. The titles of his English publications are below:
* Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your
Programming (ISBN: 1931769222);
* Hacker Disassembling Uncovered: Second Edition, totally rewritten (ISBN-10:
1931769648);
* CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (ISBN-10:
1931769338);
* Data Recovery: Tips and Solutions: Windows, Linux, and BSD (ISBN-10:
1931769567);
* Code Optimization: Effective Memory Usage (ISBN-10: 1931769249);
* Shellcoder's Programming Uncovered (ISBN-10: 193176946X);
* Hacker Debugging Uncovered (ISBN-10: 1931769400)
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 218.169.80.248
推
07/16 16:23,
07/16 16:23
推
07/16 16:34,
07/16 16:34
推
07/16 16:36,
07/16 16:36
→
07/16 16:37,
07/16 16:37
→
07/16 16:38,
07/16 16:38
→
07/16 17:02,
07/16 17:02
推
07/16 17:34,
07/16 17:34
※ 編輯: coolcliff01 來自: 218.169.94.126 (07/16 18:16)
--
※ 發信站: 批踢踢實業坊(ptt.cc)
◆ From: 122.117.170.99
推
07/16 20:14, , 1F
07/16 20:14, 1F
推
07/16 21:03, , 2F
07/16 21:03, 2F
→
07/16 21:04, , 3F
07/16 21:04, 3F
→
07/16 21:04, , 4F
07/16 21:04, 4F
→
07/16 21:04, , 5F
07/16 21:04, 5F
→
07/16 21:05, , 6F
07/16 21:05, 6F
推
07/17 00:33, , 7F
07/17 00:33, 7F
AntiVirus 近期熱門文章
PTT數位生活區 即時熱門文章