View Single Post
Staro 11.12.2019., 08:36   #358
The Exiled
McG
Moj komp
 
The Exiled's Avatar
 
Datum registracije: Feb 2014
Lokacija: Varaždin
Postovi: 6,776
Intel patches Plundervolt: High severity issues in Platform Update
Citiraj:
Plundervolt is different from "Rowhammer," in that it flips bits inside the processor, before they're written to the memory, so SGX doesn't protect them. Rowhammer doesn't work with SGX-protected memory. Plundervolt requires root privileges as software that let you tweak vCore require ring-0 access. You don't need direct physical access to the target machine, as tweaking software can also be remotely run. Intel put out security advisory SA-00298 and is working with motherboard vendors and OEMs to release BIOS updates that pack a new microcode with a mititagion against this vulnerability.
Citiraj:
When SGX is enabled on a system, a privileged user may be able to mount an attack through the control of CPU voltage settings with the potential to impact the confidentiality and integrity of software assets. Intel has worked with system vendors to develop a microcode update that mitigates the issue by locking voltage to the default settings. We were able to corrupt the integrity of Intel SGX on Intel Core processors by controling the voltage when executing enclave computations.
The list of CPU models affected by Plundervolt includes:
  • Intel 6th, 7th, 8th, 9th & 10th Generation Core Processors

  • Intel Xeon Processor E3 v5 & v6

  • Intel Xeon Processor E-2100 & E-2200 Families
Izvor: Bleeping Computer
The Exiled je offline   Reply With Quote