Jump to content

Microarchitectural Data Sampling

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Drbogdan (talk | contribs) at 11:55, 6 June 2019 (External links: relevant adds/adjs). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Microarchitectural Data Sampling
CVE identifier(s)CVE-2018-12126 (Fallout),
CVE-2018-12127 (RIDL),
CVE-2019-11091 (RIDL),
CVE-2018-12130 (RIDL, ZombieLoad)
Date discovered2018[1]
Date patched14 May 2019
DiscovererAustralia University of Adelaide
Austria Graz University of Technology
Belgium Catholic University of Leuven
China Qihoo 360
Germany Cyberus Technology
Germany Saarland University
Netherlands Vrije Universiteit Amsterdam
Romania Bitdefender
United States Oracle Corporation
United States University of Michigan
United States Worcester Polytechnic Institute[1]
Affected hardwarePre-April 2019 Intel x86 microprocessors
WebsiteZombieLoadAttack.com

The Microarchitectural Data Sampling (MDS) vulnerabilities are a set of weaknesses in Intel x86 microprocessors that leak data across protection boundaries that are architecturally supposed to be secure. The vulnerabilities have been labeled Fallout, RIDL (Rogue In-Flight Data Load) and ZombieLoad.

Description

The vulnerabilities are in the implementation of speculative execution, which is where the processor tries to guess what instructions may be needed next. They exploit the possibility of reading data buffers found between different parts of the processor.[1]

  • Fallout (CVE-2018-12126) — a leak of data being stored from store buffers[2]
  • RIDL (CVE-2018-12127, CVE-2018-12130 and CVE-2019-11091) — a leak from various internal processor buffers of data being loaded and stored[2]
  • ZombieLoad (CVE-2018-12130) — a leak of already-loaded data from a processor's fill buffer[2][3]

History

According to Intel in a May 2019 interview with Wired, Intel's researchers discovered the vulnerabilities in 2018 before anyone else.[1] Other researchers had agreed to keep the exploit confidential as well since 2018.[4]

On 14 May 2019, various groups of security researchers, amongst others from Austria's Graz University of Technology, Belgium's Catholic University of Leuven, and Netherland's Vrije Universiteit Amsterdam, in a disclosure coordinated with Intel, published the discovery of the MDS vulnerabilities in Intel microprocessors, which they named Fallout, RIDL and ZombieLoad.[1][3] Three of the TU Graz researchers were from the group who had discovered Meltdown and Spectre the year before.[1]

Impact

According to varying reports, Intel processors dating back to 2011[5] or 2008[1] are affected, and the fixes may be associated with a performance drop.[6][7] Intel reported that processors manufactured in the month before the disclosure have mitigations against the attacks.[1]

Intel characterized the vulnerabilities as "low-to-medium" impact, disagreeing with the security researchers who characterized them as major, and disagreeing with their recommendation that operating system software manufacturers should completely disable hyperthreading.[1][8] Nevertheless, the ZombieLoad vulnerability can be used by hackers exploiting the vulnerability to steal information recently accessed by the affected microprocessor.[9]

Mitigation

Fixes to operating systems, virtualization mechanisms, web browsers and microcode are necessary.[1] Microcode is the implementation of processor instructions on the processor itself, and updates require a firmware patch,[1] also known as BIOS or UEFI, to the motherboard. As of 14 May 2019, applying available updates on an affected PC system was the most that could be done to mitigate the issues.[10]

  • Intel incorporated fixes in its processors starting shortly before the public announcement of the vulnerabilities.[1]
  • On 14 May 2019, a mitigation was released for the Linux kernel,[11] and Apple, Google, Microsoft, and Amazon released emergency patches for their products to mitigate ZombieLoad.[12]
  • On 14 May 2019, Intel published a security advisory on its website detailing its plans to mitigate ZombieLoad.[13]

See also

References

  1. ^ a b c d e f g h i j k l Greenberg, Andy (14 May 2019). "Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs". WIRED. Retrieved 14 May 2019.
  2. ^ a b c Ionut Ilascu (14 May 2019). "New RIDL and Fallout Attacks Impact All Modern Intel CPUs". Bleeping Computer. Retrieved 14 May 2019.
  3. ^ a b "ZombieLoad Attack". zombieloadattack.com. Retrieved 14 May 2019.
  4. ^ "MDS attacks". mdsattacks.com. Retrieved 20 May 2019.
  5. ^ Zach Whittaker (14 May 2019). "New secret-spilling flaw affects almost every Intel chip since 2011". TechCrunch. Retrieved 14 May 2019.
  6. ^ Staff (15 May 2019). "Intel Zombieload bug fix to slow data centre computers". BBC News. Retrieved 15 May 2019.
  7. ^ Larabel, Michael (24 May 2019). "Benchmarking AMD FX vs. Intel Sandy/Ivy Bridge CPUs Following Spectre, Meltdown, L1TF, Zombieload". Phoronix. Retrieved 25 May 2019.
  8. ^ Mah Ung, Gordan (15 May 2019). "Intel: You don't need to disable Hyper-Threading to protect against the ZombieLoad CPU exploit - "ZombieLoad" exploit seems to put Intel's Hyper-Threading at risk of being put down". PC World. Retrieved 15 May 2019.
  9. ^ Jacob Kastrenakes (14 May 2019). "ZombieLoad attack lets hackers steal data from Intel chips". The Verge. Retrieved 15 May 2019.
  10. ^ O'Neill, Patrick Howell (14 May 2019). "What To Do About the Nasty New Intel Chip Flaw". Gizmodo. Retrieved 15 May 2019.
  11. ^ "ChangeLog-5.1.2". The Linux Kernel Archives. 14 May 2019. Archived from the original on 15 May 2019. Retrieved 15 May 2019. {{cite web}}: Unknown parameter |dead-url= ignored (|url-status= suggested) (help)
  12. ^ Zach Whittaker. "Apple, Amazon, Google, Microsoft and Mozilla release patches for ZombieLoad chip flaws". TechCrunch. Retrieved 14 May 2019. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  13. ^ "INTEL-SA-00233". Intel. Retrieved 14 May 2019.

Further reading

Original papers by the researchers

Information from processor manufacturers

Others