Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » GhostRace – New data leak affects modern CPUs
    Cyber Security

    GhostRace – New data leak affects modern CPUs

    techempireBy techempire2 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 15, 2024Editorial DepartmentHardware security/data protection

    Data leak hole

    A team of researchers has discovered a new data exfiltration attack that affects modern CPU architectures that support speculative execution.

    dubbing ghost race (CVE-2024-2193), which is a variant of the transient execution CPU vulnerability known as Specter v1 (CVE-2017-5753). This approach combines speculative execution and race conditions.

    “All common synchronization primitives implemented using conditional branches can be microarchitecturally bypassed on speculative paths using branch misprediction attacks, turning all architecturally race-free critical regions into speculative race conditions (SRCs), allowing the attack The attacker leaks information from the target,” the researchers said.

    The findings are from IBM Research Europe’s System Security Research Group and VUSec, which in December 2023 revealed another side-channel attack called SLAM, targeting modern processors.

    Internet security

    Specter refers to a class of side-channel attacks that exploit branch prediction and speculative execution on modern CPUs to read privileged data in memory and bypass isolation protections between applications.

    While speculative execution is a performance optimization technique used by most CPUs, Specter attacks exploit the fact that mispredictions leave traces of memory accesses or calculations in the processor cache.

    Researchers behind the Specter attack noted in January: “Spectre attacks trick victims into speculatively performing operations that would not occur during the processing of strictly serialized program instructions, exfiltrating the victim’s confidential information through covert channels. To the opponent. 》2018.

    GhostRace is noteworthy because it enables an unauthenticated attacker to exploit a race condition to extract arbitrary data from the processor, thereby gaining access to a speculative executable code path via a so-called speculative concurrent use-after-free (SCUAF) attack.

    A race condition is an undesirable situation that occurs when two or more processes attempt to access the same shared resource without proper synchronization, resulting in inconsistent results and opening the door for attackers to perform malicious actions. window of opportunity.

    “In terms of characteristics and exploitation strategies, SRC vulnerabilities are similar to classic race conditions,” the CERT Coordination Center (CERT/CC) explained in an advisory.

    “The difference, however, is that the attacker exploits the race condition on a transient execution path originating from a misspecified branch (similar to Specter v1), with a malicious code snippet or gadget that ultimately leaks information to the attacker. Target.”

    The end result is that it allows an attacker with access to CPU resources to access arbitrary sensitive data from host memory.

    Internet security

    “Any software, such as operating systems, virtual machine hypervisors, etc., that implements synchronization primitives through conditional branches without any serialization instructions in that path, and in any microarchitecture (e.g., x86, ARM, RISC-V, etc. ), which allows speculative execution of conditional branches that are vulnerable to SRC,” VUSec said.

    Following Responsible Disclosure, AMD said its existing guidance for Specter “remains applicable to mitigating this vulnerability.” The maintainers of the Xen open source hypervisor acknowledge that all versions are affected, although they say it is unlikely to pose a serious security threat.

    Xen said: “Out of an abundance of caution, the Xen security team has provided a hardening patch that includes adding a new LOCK_HARDEN mechanism on x86, similar to the existing BRANCH_HARDEN.”

    “Due to the uncertainty of the vulnerability under Xen and the uncertainty of the performance impact, LOCK_HARDEN is turned off by default. However, we anticipate more research in this area and believe it is prudent to take mitigation measures. “

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.