Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Microarchitectural Data Sampling

From Wikipedia, the free encyclopedia
CPU vulnerabilities
See also:Transient execution CPU vulnerability

Microarchitectural Data Sampling
Logo designed for the vulnerabilities, featuring a wounded hand holding a broken microprocessor
CVE identifier(s)CVE-2018-12126 (Fallout),
CVE-2018-12127 (RIDL),
CVE-2019-11091 (RIDL, ZombieLoad),
CVE-2018-12130 (RIDL, ZombieLoad),
CVE-2019-11135 (ZombieLoad v2)
Date discovered2018[1]
Date patched14 May 2019
DiscovererAustraliaUniversity of Adelaide
AustriaGraz University of Technology
BelgiumCatholic University of Leuven
ChinaQihoo 360
Germany Cyberus Technology
GermanySaarland University
NetherlandsVrije Universiteit Amsterdam
RomaniaBitdefender
United StatesOracle Corporation
United StatesUniversity of Michigan
United StatesWorcester Polytechnic Institute[1]
Affected hardwarePre-April 2019Intel x86microprocessors
Websitemdsattacks.comZombieLoadAttack.com

TheMicroarchitectural Data Sampling (MDS)vulnerabilities are a set of weaknesses inIntel x86 microprocessors that usehyper-threading, and leak data across protection boundaries that are architecturally supposed to be secure. The attacks exploiting the vulnerabilities have been labeledFallout,RIDL (Rogue In-Flight Data Load),ZombieLoad.,[2][3][4] andZombieLoad 2.[5]

Description

[edit]

The vulnerabilities are in the implementation ofspeculative execution, which is where the processor tries to guess what instructions may be needed next. They exploit the possibility of readingdata buffers found between different parts of the processor.[1][2][6][7]

  • Microarchitectural Store Buffer Data Sampling (MSBDS),CVE-2018-12126
  • Microarchitectural Load Port Data Sampling (MLPDS), CVE-2018-12127
  • Microarchitectural Fill Buffer Data Sampling (MFBDS), CVE-2018-12130
  • Microarchitectural Data Sampling Uncacheable Memory (MDSUM), CVE-2019-11091
  • Transactional Asynchronous Abort (TAA),CVE-2019-11135

Not all processors are affected by all variants of MDS.[8]

History

[edit]

According to Intel in a May 2019 interview withWired, Intel's researchers discovered the vulnerabilities in 2018 before anyone else.[1] Other researchers had agreed to keep the exploit confidential as well since 2018.[9]

On 14 May 2019, various groups of security researchers, amongst others from Austria'sGraz University of Technology, Belgium'sCatholic University of Leuven, and Netherlands'Vrije Universiteit Amsterdam, in adisclosure coordinated with Intel, published the discovery of the MDS vulnerabilities in Intel microprocessors, which they named Fallout, RIDL and ZombieLoad.[1][6] Three of the TU Graz researchers were from the group who had discoveredMeltdown andSpectre the year before.[1]

On 12 November 2019, a new variant of the ZombieLoad attack, called Transactional Asynchronous Abort, was disclosed.[10][11]

Impact

[edit]

According to varying reports, Intel processors dating back to 2011[12] or 2008[1] are affected, and the fixes may be associated with aperformance drop.[13][14] Intel reported that processors manufactured in the month before the disclosure have mitigations against the attacks.[1]

Intel characterized the vulnerabilities as "low-to-medium" impact, disagreeing with the security researchers who characterized them as major, and disagreeing with their recommendation that operating system software manufacturers should completely disablehyperthreading.[1][15] Nevertheless, the ZombieLoad vulnerability can be used by hackers exploiting the vulnerability to steal information recently accessed by the affected microprocessor.[16]

Mitigation

[edit]

Fixes tooperating systems,virtualization mechanisms,web browsers andmicrocode are necessary.[1] As of 14 May 2019[update], applying available updates on an affected PC system was the most that could be done to mitigate the issues.[17]

  • Intel incorporated fixes in its processors starting shortly before the public announcement of the vulnerabilities.[1]
  • On 14 May 2019, a mitigation was released for theLinux kernel,[18] andApple,Google,Microsoft, andAmazon released emergency patches for their products to mitigate ZombieLoad.[19]
  • On 14 May 2019,Intel published a security advisory on its website detailing its plans to mitigate ZombieLoad.[7]

See also

[edit]

References

[edit]
  1. ^abcdefghijkGreenberg, Andy (2019-05-14)."Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs".WIRED. Retrieved2019-05-14.
  2. ^abIlascu, Ionut (2019-05-14)."New RIDL and Fallout Attacks Impact All Modern Intel CPUs". Bleeping Computer. Retrieved2019-05-14.
  3. ^Spectre-NG-Lücken: OpenBSD schaltet Hyper-Threading ab, heise.de, 2018-06, accessed 2019-09-29
  4. ^Let's Talk To Linux Kernel Developer Greg Kroah-Hartman | Open Source Summit, 2019, TFIR, 2019-09-03
  5. ^Winder, Davey (2019-11-13)."Intel Confirms 'ZombieLoad 2' Security Threat".Forbes.Archived from the original on 2020-01-14. Retrieved2020-01-14.
  6. ^ab"ZombieLoad Attack".zombieloadattack.com. Retrieved2019-05-14.
  7. ^ab"INTEL-SA-00233".Intel. Retrieved2019-05-14.
  8. ^"Microarchitectural Data Sampling".The Linux kernel user's and administrator's guide. 2019-05-14.
  9. ^"MDS attacks".mdsattacks.com. Retrieved2019-05-20.
  10. ^Nichols, Shaun (2019-11-12)."True to its name, Intel CPU flaw ZombieLoad comes shuffling back with new variant".www.theregister.co.uk. Retrieved2019-11-12.
  11. ^Cimpanu, Catalin."Intel's Cascade Lake CPUs impacted by new Zombieload v2 attack".ZDNet. Retrieved2019-11-12.
  12. ^Whittaker, Zach (2019-05-14)."New secret-spilling flaw affects almost every Intel chip since 2011".TechCrunch. Retrieved2019-05-14.
  13. ^"Intel Zombieload bug fix to slow data centre computers".BBC News. 2019-05-15. Retrieved2019-05-15.
  14. ^Larabel, Michael (2019-05-24)."Benchmarking AMD FX vs. Intel Sandy/Ivy Bridge CPUs Following Spectre, Meltdown, L1TF, Zombieload".Phoronix. Retrieved2019-05-25.
  15. ^Mah Ung, Gordan (2019-05-15)."Intel: You don't need to disable Hyper-Threading to protect against the ZombieLoad CPU exploit - "ZombieLoad" exploit seems to put Intel's Hyper-Threading at risk of being put down".PC World. Retrieved2019-05-15.
  16. ^Kastrenakes, Jacob (2019-05-14)."ZombieLoad attack lets hackers steal data from Intel chips".The Verge. Retrieved2019-05-15.
  17. ^O'Neill, Patrick Howell (2019-05-14)."What To Do About the Nasty New Intel Chip Flaw".Gizmodo. Retrieved2019-05-15.
  18. ^"ChangeLog-5.1.2".The Linux Kernel Archives. 2019-05-14.Archived from the original on 2019-05-15. Retrieved2019-05-15.
  19. ^Whittaker, Zach."Apple, Amazon, Google, Microsoft and Mozilla release patches for ZombieLoad chip flaws".TechCrunch. Retrieved2019-05-14.

Further reading

[edit]

Original papers by the researchers

[edit]

Information from processor manufacturers

[edit]

External links

[edit]
Variants
Topics
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Portal:
Retrieved from "https://en.wikipedia.org/w/index.php?title=Microarchitectural_Data_Sampling&oldid=1295368088"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp