Year: 2018

Intel Responds to Spectre-Like Flaw In CPUs

Intel acknowledged that its processors are vulnerable to another dangerous speculative execution side channel flaw that could give attackers unauthorized read access to memory.

The new vulnerability, disclosed by Google Project Zero and Microsoft’s Security Response Center, is called Variant 4, and potentially enables attackers to read privileged data across trust boundaries. That’s similar to two side channel analysis vulnerabilities, Meltdown and Spectre, Intel faced earlier this year in its server and desktop processors.

Variant 4 (CVE-2018-3639) is also a side channel analysis security flaw, but it uses a different process to extract information, and the most common use is in web browsers.

“Like the other GPZ variants, Variant 4 uses speculative execution, a feature common to most modern processor architectures, to potentially expose certain kinds of data through a side channel,” Leslie Culbertson, executive vice president and general manager of Product Assurance and Security at Intel, said in a post on Monday. “In this case, the researchers demonstrated Variant 4 in a language-based runtime environment.  While we are not aware of a successful browser exploit, the most common use of runtimes, like JavaScript, is in web browsers.”

Almost 50 Intel processor brands are impacted by the newest vulnerability, including Intel’s Atom, Core and Xeon lineups. However, the chip company said it hasn’t seen any real-world exploits of the new variant. Intel also disclosed a Rogue System Register Read vulnerability (CVE-2018-3640) called Variant 3a.

Variant 4, similar to other Spectre vulnerabilities, stems from a glitch in Intel-based products. Essentially microprocessors use speculative execution and speculative execution of memory to read before the addresses of all prior memory writes are known. This enables an attacker with local user access using a side-channel analysis (aka Variant 4) to gain unauthorized disclosure of information.

Google Project Zero’s Jann Horn and Microsoft’s Ken Johnson first reported Variant 4.

Horn said in a post that he first set on track to discovering Variant 4 after noticing  Intel’s Optimization Manual (in section 2.4.4.5, regarding “memory disambiguation”) said that:

“A load instruction micro-op may depend on a preceding store. Many microarchitectures block loads until all preceding store address are known.

The memory disambiguator predicts which loads will not depend on any previous stores. When the disambiguator predicts that a load does not have such a dependency, the load takes its data from the L1 data cache. Eventually, the prediction is verified. If an actual conflict is detected, the load and all succeeding instructions are re-executed.”

After further experiments, Horn said this effect can be used to cause speculative execution to “continue far enough to execute a Spectre-style gadget on a pointer read from a memory slot to which a store has been speculatively ignored.”

Essentially, Horn found that Variant 4 could be exploited by program scripts in order to access data stored elsewhere in a program – enabling attackers running a script in a browser to read data from another browser tab.

In a security advisory, Microsoft said that the new variant could allow an attacker to read privileged data across trust boundaries, and can be exploited through vulnerable code patterns in the operating system (OS) or in applications could allow an attacker to exploit this vulnerability.

“In the case of Just-in-Time (JIT) compilers, such as JavaScript JIT employed by modern web browsers, it may be possible for an attacker to supply JavaScript that produces native code that could give rise to an instance of CVE-2018-3639,” said Microsoft. “However, Microsoft Edge, Internet Explorer, and other major browsers have taken steps to increase the difficulty of successfully creating a side channel.”

Intel rated the new vulnerability as a “moderate” risk because starting in January most leading browser providers – like Safari, Edge and Chrome – all patched for Meltdown in their managed runtimes, and “these mitigations are also applicable to variant 4 and available for consumers to use today,” Intel said.

However, the company said it will still release a full mitigation option in the coming weeks to “prevent this method from being used in other ways.”

Vendor Mitigations

An array of vendors have responded to Variant 4. Red Hat said in a post that “Red Hat Product Security is aware of this issue. Updates will be released as they become available.”

AMD recommended customers check for mitigations being provided by operating system updates back to its Bulldozer lineup: “Microsoft is completing final testing and validation of AMD-specific updates for Windows client and server operating systems, which are expected to be released through their standard update process,” it said in an advisory.  “Similarly, Linux distributors are developing operating system updates for SSB. AMD recommends checking with your OS provider for specific guidance on schedules.”

ARM stressed that the majority of its processors are not impacted by any side-channel flaw variant; however, several specific models, including Cortex-A17 and Cortex-A75, may be.

IBM, meanwhile said that mitigation for Variant 4 will impact Power Systems clients. Customers need to install patches to both system firmware and operating systems, according to IBM: “Both the firmware and OS patches are required for the mitigation to be effective against these vulnerabilities and the latest firmware and OS patches incorporate mitigations for the fourth variant,” it said in a post. Firmware patches for POWER7, POWER7+, POWER8 and POWER9 platforms are now available.

Patching and Performance

Intel said the vulnerability mitigations (coined as Speculative Store Bypass Disable, or SSBD) for Variant 4 will be released by OEM system manufacturers and system software vendors in the coming weeks. Similar to earlier in the year, the fixes for the flaw could also impact performance by between 2 and 8 percent for certain systems.

“In this configuration, we have observed no performance impact. If enabled, we’ve observed a performance impact of approximately 2 to 8 percent based on overall scores for benchmarks like SYSmark 2014 SE and SPEC integer rate on client and server test systems,” Culbertson said in her post.

The same update also includes microcode that addresses Variant 3a (Rogue System Register Read), Intel said. “We have not observed any meaningful performance impact on client or server benchmarks with the Variant 3a mitigation,” Culbertson said.

Spectre and Meltdown also infamously faced messy patching efforts across the industry in the wake of the vulnerability disclosure. Intel initially released patches addressing the Spectre and Meltdown vulnerabilities in January, but later yanked its patches for the Variant 2 flaw – both for client compute and data center chips – after acknowledging that they caused “higher than expected reboots and other unpredictable system behavior.”

Industry Reaction

The new vulnerability comes as no surprise to the industry, especially with rumors swirling that new Spectre-like flaws would be disclosed by German magazine c’t earlier in May.

However, beyond that, industry experts such as Renaud Deraison, co-founder and CTO of Tenable, think that the tech world is moving headfirst into making chips  quicker and more efficient –  so quick, in fact, that they are prioritizing speed over security.

“We as an industry have trained people to expect speed,” Deraison said. “The speed of the chips inside our personal computers, our tablets and our phones is critical to their performance — everybody knows that. In this case, the vulnerabilities take advantage of the very features that make them fast. Intel optimized for performance and later learned they were facing a trade off between security and performance. The vast majority of people would choose speed over security, too.”

How to find out the Connected state of a network card in Linux

Every once in a while, we Linux administrators want to know if a network cable that's connected to a Linux box is connected or not without having to physically move the machine and checking the connection and watching to see if the little green light blinks.

Linux has a way for administrators to quickly check the status of the connection via the Terminal.  Here's how:

At the Terminal prompt, type: cat /sys/class/net/enp5s0/carrier

If the output returns with a "1", then the cable should be connected and talking to the network.

For a more English type of response, enter: cat /sys/class/net/enp5s0/operstate

The output will return by saying "up".

That's it.

 

Wicked Botnet Uses Passel of Exploits to Target IoT

Yet another variant of the Mirai botnet has appeared on the scene, but this one has a twist: The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers. It also has ties to a web of other botnets, made for DDoS attacks, which can all be traced back to one threat actor.

The original Mirai used traditional brute-force attempts to gain access to connected things in order to enslave them, but the Wicked Botnet, named after the underground handle chosen by its author, prefers to go the exploit route to gain access.

Fortinet’s FortiGuard Labs team analyzed the botnet, and found that the exploits it uses are matched to the ports it uses.

“It scans ports 8080, 8443, 80 and 81 by initiating a raw socket SYN connection; if a connection is established, it will attempt to exploit the device and download its payload,” explained researchers Rommel Joven and Kenny Yang, in the analysis. “It does this by writing the exploit strings to the socket. The exploit to be used depends on the specific port the bot was able to connect to.”

Specifically, port 8080 brings an exploit for a flaw in Netgear DGN1000 and DGN2200 v1 routers (also used by the Reaper botnet); a connection to port 81 makes use of a CCTV-DVR remote code execution flaw; port 8443 connections use a command injection exploit for the Netgear R7000 and R6400 routers (CVE-2016-6277); and port 80 corresponds with an invoker shell in compromised web servers. The latter does not directly exploit the device, but instead takes advantage of compromised web servers with malicious web shells already installed.

“Since a lot of IoT malware (e.g. Mirai) have already attacked devices via default passwords/ brute-forcing, new attacks like Wicked bot are forced to take a different option like the use of exploits to become effective,” explained Joven, in an interview with Threatpost.

They also uncovered that Wicked is a botnet that’s used to download another botnet. Rather than just equipping Wicked itself with the ability to carry out whatever action the criminal behind the bot wants, the author wanted to separate the distribution and its payload.

“This has advantages in development as well to evade detection,” Joven told us. “The same goes with other malware (e.g. ransomware) which has a document or script to download the ransomware payload.”

A Wicked Web of Botnets

The analysts also found that the Wicked bot is connected to other, previous Mirai-based botnets; in fact, in terms of payloads, Wicked is built to download them. This led them to the author behind the Wicked bot.

They essentially followed a trail of breadcrumbs: For one, the Wicked bot’s code contains a the string called “SoraLOADER,” which seems to indicate that it’s a spreader for the Sora botnet, another Mirai variant.

However, the malicious website that houses the bad code contains the name “Owari,” which is the name of yet another Mirai variant.

On top of that, the payload that it delivers is not Owari at all, but rather the Omni bot, which based on its code can be used for DDoS attack similar to Mirai.

“At the time of analysis, the Owari bot samples could no longer be found in the website directory,” the researchers explained. “[However], we doublechecked the history of the malicious website and confirmed that it had previously delivered the Owari botnet.”

Thus, it would seem that Omni, Owari and Sora are all connected to the Wicked bot.

“Fuzzing the website’s /bins directory, we found other Omni samples in the directory, which were reported to be delivered using the GPON vulnerability (CVE-2018-10561),” the researchers said. “Payloads are regularly updated, as shown by its timestamp.”

Putting this connection together with an interview last April conducted by NewSky Security, the researchers were able to trace the new bot back to an author using the pseudonym “Wicked” in which he confirmed himself as the author of both Sora and Owari.

“Apparently, as seen in the /bins repository, Sora and Owari botnet samples have now both been abandoned and replaced with Omni,” Fortinet’s Joven and Yang said. “This also leads us to the conclusion that while the Wicked bot was originally meant to deliver the Sora botnet, it was later repurposed to serve the author’s succeeding projects.”

Sean Newman, director of product management at Corero Network Security, said via email that while the rash of Mirai variants is unsurprising given that the source code leaked two years ago, “the suggestion that hackers don’t get it right every time, with some variants apparently abandoned before they were actively used, is both interesting and concerning.”

He added, “The fact that hackers can even experiment with their innovation in the wild on live systems, without being detected, further highlights the scale of the challenge that the poor security posture of IoT devices presents.”

11 Reasons to buy an Apple Watch instead of FitBit

(Business Insider): In the world of smartwatches, Apple Watch reigns supreme— and for good reason.

The 4-year-old watch — which is on its fourth iteration, the Apple Watch Series 3 — is still the best watch for iPhone users. It has built-in GPS, an optional cellular connection, a stunning edge-to-edge display, and can even tell you when you're having heart problems.

But in recent months, Fitbit introduced an exciting new smartwatch called Fitbit Versa that looks a lot like an Apple Watch, has most of the same features, and costs a fraction of the price.

To read the rest of the article, click here.

You may have Missed:

Verified by MonsterInsights