AntiVirus 板


LINE

※ [本文转录自 hardware 看板] 作者: coolcliff01 (神阿..好你个死人头) 看板: hardware 标题: [News] 无差别攻击 intel CPU Bug将导致远程代码攻击 时间: Wed Jul 16 15:44:58 2008 转载自 http://tinyurl.com/5n9v95 这是一个intel CPU的漏洞所导致的一个弱点! 可能会被用来进行远端攻击,受影响的作业系统为"任何" 这是一种很有趣的攻击方式 是针对特定硬体的而来的弱点攻击!而且没有限定作业系统 不管是Windows,Linux,BSD等都有可能经由这个弱点被攻击! 而Kris Kaspersky(Kaspersky安全研究员)表示他计划将在今年10月所举行的HITB 展示这个弱点攻击,并说明如何利用CPU Bug来达攻击的目的! ***************************************************************** Presentation Title: Remote Code Execution Through Intel CPU Bugs Presentation Abstract: According to the Intel Specification Updates, Intel Core 2 has 128 confirmed bugs. Intel Itanium (designed for critical systems) looks more 「promising」, carrying over 230 bugs. They have all been confirmed by Intel and described in errata section of their specification updates. Some bugs 「just」 crash the system (under quite rare conditions) while the others give the attackers full control over the machine. In other words, Intel CPUs have exploitable bugs which are vulnerable to both local and remote attacks which works against any OS regardless of the patches applied or the applications which are running. Although CPU bugs are not something new in the security industry, nobody has come out with any proof-of-concept exploits and as it stands, there are no known malware that take advantage of these bugs, although some malware writers have actually used CPU bugs for targeted attacks. It is just a matter of time before we start seeing these sort of attacks used in more devastating ways over the Internet. Intel has provided workarounds to major BIOS vendors for some of these bugs, but who knows which vendor actually uses them? End-users are in the dark as to how to check if they are secure or not. Intel doesn't provide any test program for this and the worst thing is - some bugs are still not fixed. In other words, Intel has no workaround for it. In this presentation, I will share with the participants the finding of my CPU malware detection research which was funded by Endeavor Security. I will also present to the participants my improved POC code and will show participants how it's possible to make an attack via JavaScript code or just TCP/IP packets storms against Intel based machine. Some of the bugs that will be shown are exploitable via common instruction sequences and by knowing the mechanics behind certain JIT Java-compilers, attackers can force the compiler to do what they want (for example: short nested loops lead to system crashes on many CPUs). I will also share with the participants my experience in data recovery and how CPU bugs have actually contributed in damaging our hard drives without our knowledge. About Kris Kris Kaspersky has over 15 years of software engineering and reverse engineering experience in CD/DVD protections, PE/ELF packers/protectors, CD/DVD copiers, audio/video codecs (MPEG 1/MPEG 2/MPEG 4), data flow optimization, CPU-specific optimization, compiler specific optimization, debugging code and much more. As an independent consultant and technical writer, Kris has been an active researcher in the field of reverse engineering and pretty much dedicated his daily life in mastering the art. He possesses a deep knowledge in OS internals and low level ASM. He is also the author for Xakep magazine and has published more than 20 books about system programming. The titles of his English publications are below: * Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming (ISBN: 1931769222); * Hacker Disassembling Uncovered: Second Edition, totally rewritten (ISBN-10: 1931769648); * CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (ISBN-10: 1931769338); * Data Recovery: Tips and Solutions: Windows, Linux, and BSD (ISBN-10: 1931769567); * Code Optimization: Effective Memory Usage (ISBN-10: 1931769249); * Shellcoder's Programming Uncovered (ISBN-10: 193176946X); * Hacker Debugging Uncovered (ISBN-10: 1931769400) --



※ 发信站: 批踢踢实业坊(ptt.cc)
◆ From: 218.169.80.248
1F:推 denix:这个人是天才吗? 07/16 16:23
2F:推 fantasiaa:AMD会出来补刀吗? 07/16 16:34
3F:推 MOONRAKER:FDIV bug重现江湖? 07/16 16:36
4F:→ MOONRAKER:(当然,FDIV比这轻松多了) 07/16 16:37
5F:→ sohate5566:还好我用AMD(茶ing) 07/16 16:38
6F:→ loudness:结果发现AMD处理器有更多Bug可以攻击XDDDDDD 07/16 17:02
7F:推 CloudJ:intel的反击方法: 出资找更多骇客来找AMD的bug XD 07/16 17:34
※ 编辑: coolcliff01 来自: 218.169.94.126 (07/16 18:16) --



※ 发信站: 批踢踢实业坊(ptt.cc)
◆ From: 122.117.170.99
8F:推 YTsungL:很好, 很强大 07/16 20:14
9F:推 junorn:让我想到mj001那边他自己号称自己研发的 07/16 21:03
10F:→ junorn:隐藏式Boot加载,他的说法是不感染MBR\BootSector\Ntldr 07/16 21:04
11F:→ junorn:、新增任何文件,即使使用WinPe或将硬盘拆下亦无法检查出 07/16 21:04
12F:→ junorn:来的BootKit启动模式 07/16 21:04
13F:→ junorn:不知道怎麽做到的.... 07/16 21:05
14F:推 final01:这个卡巴斯基很有名 07/17 00:33







like.gif 您可能会有兴趣的文章
icon.png[问题/行为] 猫晚上进房间会不会有憋尿问题
icon.pngRe: [闲聊] 选了错误的女孩成为魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一张
icon.png[心得] EMS高领长版毛衣.墨小楼MC1002
icon.png[分享] 丹龙隔热纸GE55+33+22
icon.png[问题] 清洗洗衣机
icon.png[寻物] 窗台下的空间
icon.png[闲聊] 双极の女神1 木魔爵
icon.png[售车] 新竹 1997 march 1297cc 白色 四门
icon.png[讨论] 能从照片感受到摄影者心情吗
icon.png[狂贺] 贺贺贺贺 贺!岛村卯月!总选举NO.1
icon.png[难过] 羡慕白皮肤的女生
icon.png阅读文章
icon.png[黑特]
icon.png[问题] SBK S1安装於安全帽位置
icon.png[分享] 旧woo100绝版开箱!!
icon.pngRe: [无言] 关於小包卫生纸
icon.png[开箱] E5-2683V3 RX480Strix 快睿C1 简单测试
icon.png[心得] 苍の海贼龙 地狱 执行者16PT
icon.png[售车] 1999年Virage iO 1.8EXi
icon.png[心得] 挑战33 LV10 狮子座pt solo
icon.png[闲聊] 手把手教你不被桶之新手主购教学
icon.png[分享] Civic Type R 量产版官方照无预警流出
icon.png[售车] Golf 4 2.0 银色 自排
icon.png[出售] Graco提篮汽座(有底座)2000元诚可议
icon.png[问题] 请问补牙材质掉了还能再补吗?(台中半年内
icon.png[问题] 44th 单曲 生写竟然都给重复的啊啊!
icon.png[心得] 华南红卡/icash 核卡
icon.png[问题] 拔牙矫正这样正常吗
icon.png[赠送] 老莫高业 初业 102年版
icon.png[情报] 三大行动支付 本季掀战火
icon.png[宝宝] 博客来Amos水蜡笔5/1特价五折
icon.pngRe: [心得] 新鲜人一些面试分享
icon.png[心得] 苍の海贼龙 地狱 麒麟25PT
icon.pngRe: [闲聊] (君の名は。雷慎入) 君名二创漫画翻译
icon.pngRe: [闲聊] OGN中场影片:失踪人口局 (英文字幕)
icon.png[问题] 台湾大哥大4G讯号差
icon.png[出售] [全国]全新千寻侘草LED灯, 水草

请输入看板名称,例如:Boy-Girl站内搜寻

TOP