Vulnerabilities / Threats

5/4/2018
03:35 PM
100%
0%

Spectre Returns with 8 New Variants

Researchers have discovered versions of the processor vulnerability.

It's hard to keep a bad vulnerability down. In this case, Spectre is back in eight new varieties that promise to keep alive the conversation on the best way to defend a vulnerability that exists at the most basic level of a computing system — and how to close a vulnerability that is an integral part of modern computing's high performance.

German security website reported yesterday that unnamed researchers have found a series of new vulnerabilities that take advantage of the same issues reported in the original Spectre and Meltdown incidents. According to the site, each of the vulnerabilities will have its own number in the CVE directory as parts of a block of entries Intel has reserved for just such a possibility.

Of the eight, four have been designated "high risk" and four "medium risk," with all apparently having results similar to the original vulnerabilities — all, that is, except one.

The one exception would allow an exploit to go much farther in its boundary crossing than the original. In the new version, a malicious process launched in one virtual machine could read data from the cache of another virtual machine or from the hypervisor. This behavior significantly increases the potential impact of a breach.

"The basic problem is that, as part of the operating system, we've taken great pains to isolate the memory space of process 1 from the memory space of process 2. This security domain is destroyed by the time you get into the cache," says Satya Gupta, CTO and co-founder of Virsec. That domain destruction is already in process by the time Spectre exploit code executes, though, because of the way that Spectre operates.

"Specter and melt down are components of something else," says Mike Murray, vice president of security intelligence at Lookout. "If you give me an account on your laptop you should worry about Specter," he says, adding, "but if you don't, and you're not going to any sketchy Web pages that happen to be exploiting it or things like that, then the odds of me being able to use it are pretty small."

"It's a local privilege escalation more than anything else," Murray says, though that may do little to soothe fears of a vulnerability so deeply embedded in the system.

According to Heise.de, the website reporting these new variants, Intel has patches in process and will release the patches in two waves, the first in May and the second in August. These patches will be accompanied by patches from Microsoft and other operating system publishers.

Gupta says the ultimate fix to the problem involves a change to one of the processor's core components. "The smallest possible part to change is the instruction cache," he says. "It's agnostic now and it loses the linkage between process and instruction. The processors need to have an idea of which process is executing — memory isolation is really important."

In some ways, the issue may be even more basic than the silicon. "Complexity breeds opportunity for vulnerability. And we just keep making the systems more complex," says Murray.

Contacted separately, Gupta and Murray were each asked whether they thought that there would be more Spectre-like vulnerabilities announced in the future. Each began their answer with a laugh before continuing, "Oh, yes."

Related content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14633
PUBLISHED: 2018-09-25
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The at...
CVE-2018-14647
PUBLISHED: 2018-09-25
Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by contructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming larg...
CVE-2018-10502
PUBLISHED: 2018-09-24
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exist...
CVE-2018-11614
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Members Fixed in version 2.4.25. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
CVE-2018-14318
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8 G950FXXU1AQL5. User interaction is required to exploit this vulnerability in that the target must have their cellular radios enabled. The specific flaw exists within the handling of ...