Content deleted Content added
Change VU name to the official name |
Maxeto0910 (talk | contribs) no sentence Tags: Mobile edit Mobile web edit Advanced mobile edit |
||
(43 intermediate revisions by 30 users not shown) | |||
Line 1:
{{short description|CPU vulnerabilities}}
{{Use dmy dates|date=May 2019}}▼
{{See also|Transient execution CPU vulnerability}}
▲{{Use dmy dates|date=May 2019|cs1-dates=y}}
{{Infobox bug
| name = Microarchitectural Data Sampling
| image = ZombieLoad Attack logo square.svg
| alt =
| caption = Logo designed for the vulnerabilities, featuring a wounded hand holding a broken microprocessor
| screenshot =
| screenshot_size =
| screenshot_alt =
| screenshot_caption =
| CVE =
| discovered = 2018<ref name="Greenberg"
| patched = 14 May 2019
| discoverer = {{flagicon|Australia}} [[University of Adelaide]]<br
| affected hardware = Pre-April 2019 [[Intel x86]] [[microprocessor]]s
| affected software =
| used by =
| website = {{URL|https://mdsattacks.com|mdsattacks.com}} {{URL|https://zombieloadattack.com|ZombieLoadAttack.com}}
}}
The '''Microarchitectural Data Sampling''' ('''MDS''') [[vulnerability (computing)|vulnerabilities]] are a set of weaknesses in [[Intel CPUs|Intel x86 microprocessors]] that use [[hyper-threading]], and leak data across protection boundaries that are architecturally supposed to be secure. The attacks exploiting the vulnerabilities have been labeled '''Fallout''', '''RIDL''' (''Rogue In-Flight Data Load''), '''ZombieLoad'''.,<ref name="new"/><ref>[https://www.heise.de/security/meldung/Spectre-NG-Luecken-OpenBSD-schaltet-Hyper-Threading-ab-4087035.html Spectre-NG-Lücken: OpenBSD schaltet Hyper-Threading ab], heise.de, 2018-06, accessed 2019-09-29</ref><ref>[https://www.youtube.com/watch?v=sDrRvrh16ws&t=75 Let's Talk To Linux Kernel Developer Greg Kroah-Hartman | Open Source Summit, 2019], TFIR, 2019-09-03</ref> and '''ZombieLoad 2'''.<ref>{{Cite web|url=https://www.forbes.com/sites/daveywinder/2019/11/13/zombie-inside-intel-confirms-zombieload-2-security-threat/|title=Intel Confirms 'ZombieLoad 2' Security Threat|last=Winder|first=Davey|date=2019-11-13|website=[[Forbes]]|language=en|url-status=live|archive-url=https://archive.today/20200114182955/https://www.forbes.com/sites/kateoflahertyuk/2020/01/14/new-citrix-security-alert-us-government-issues-test-tool-for-serious-flaw/%2352628b892865|archive-date=14 January 2020|access-date=2020-01-14}}</ref>
==Description==
The vulnerabilities are in the implementation of [[speculative execution]], which is where the processor tries to guess what instructions may be needed next. They exploit the possibility of reading [[data buffer]]s found between different parts of the processor.<ref name="Greenberg"/><ref name="new">{{cite web |url=https://www.bleepingcomputer.com/news/security/new-ridl-and-fallout-attacks-impact-all-modern-intel-cpus/ |title=New RIDL and Fallout Attacks Impact All Modern Intel CPUs |author-first=Ionut |author-last=Ilascu |publisher=Bleeping Computer |date=14 May 2019 |access-date=14 May 2019}}</ref><ref name="zombieloadattack.com" /><ref name="sa-00233"/>
* Microarchitectural Store Buffer Data Sampling (MSBDS), {{CVE|2018-12126}}
* Microarchitectural Load Port Data Sampling (MLPDS), {{CVE|2018-12127|link=no}}
* Microarchitectural Fill Buffer Data Sampling (MFBDS), {{CVE|2018-12130|link=no}}
* Microarchitectural Data Sampling Uncacheable Memory (MDSUM), {{CVE|2019-11091|link=no}}
*Transactional Asynchronous Abort (TAA), [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135 CVE-2019-11135]
==History==
According to Intel in a May 2019 interview with [[Wired.com|Wired]], Intel's researchers discovered the vulnerabilities in 2018 before anyone else.<ref name="Greenberg"
On 14 May 2019,
On 12 November 2019, a new variant of the ZombieLoad attack, called Transactional Asynchronous Abort, was disclosed.<ref>{{Cite web|url=https://www.theregister.co.uk/2019/11/12/zombieload_cpu_attack/|title=True to its name, Intel CPU flaw ZombieLoad comes shuffling back with new variant|first=Shaun|last=Nichols|date=12 November 2019|website=www.theregister.co.uk|language=en|access-date=2019-11-12}}</ref><ref>{{Cite web|url=https://www.zdnet.com/article/intels-cascade-lake-cpus-impacted-by-new-zombieload-v2-attack/|title=Intel's Cascade Lake CPUs impacted by new Zombieload v2 attack|last=Cimpanu|first=Catalin|website=ZDNet|language=en|access-date=2019-11-12}}</ref>
==Impact==
According to varying reports, Intel processors dating back to 2011<ref>{{cite
Intel characterized the vulnerabilities as "low-to-medium" impact, disagreeing with the security researchers who characterized them as major, and disagreeing with their recommendation that operating system software manufacturers should completely disable [[hyperthreading]].<ref name="Greenberg"
==Mitigation==
Fixes to [[operating systems]], [[virtualization]] mechanisms, [[web browsers]] and [[microcode]] are necessary.<ref name="Greenberg"
{{As of|2019|05|14}}, applying available updates on an affected PC system was the most that could be done to mitigate the issues.<ref name="GZM-20190514">{{cite news |author-last=O'Neill |author-first=Patrick Howell |title=What To Do About the Nasty New Intel Chip Flaw |url=https://gizmodo.com/what-to-do-about-the-new-intel-chip-flaw-1834759126 |date=14 May 2019 |work=[[Gizmodo]] | *Intel incorporated fixes in its processors starting shortly before the public announcement of the vulnerabilities.<ref name="Greenberg"
*On 14 May 2019, a
*On 14 May 2019, [[Intel]] published a security advisory on its website detailing its plans to mitigate ZombieLoad.<ref name="sa-00233">{{cite web |url=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html |title=INTEL-SA-00233 |website=Intel |
== See also ==
* [[Transient execution CPU vulnerabilities]]
* [[Hardware security bug]]
== References ==
{{Reflist
== Further reading ==
=== Original papers by the researchers ===
* {{cite
* {{cite
* {{cite
* {{cite
* {{cite web |url=https://cpu.fail/ |title=cpu.fail |date=2019-05-14 |publisher=[[Graz University of Technology]]}}
=== Information from processor manufacturers ===
* {{cite web
* {{cite web
▲* {{cite web|ref=harv|title=Microarchitectural Data Sampling|url=https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html|date=2019-05-14|work=The Linux kernel user’s and administrator’s guide}}
== External links ==
Line 72 ⟶ 78:
{{Speculative execution exploits}}
{{Hacking in the 2010s}}
{{Portal bar|Business and economics}}
[[Category:
[[Category:Intel x86 microprocessors]]
[[Category:
[[Category:X86 memory management]]
|