Gideon
2[H]4U
- Joined
- Apr 13, 2006
- Messages
- 3,674
Report from OC3D that Intel has been informed of a new speculative attack on their cpu and will be software mitigated by Microsoft.
Intel Impacted by new SWAPGS Speculative Execution Attack
Researchers over at Bitdefender have uncovered a new side-channel attack which impacts Intel x86 processors. This new Speculative Execution attack is called SWAPGS, and has been designated the CVE-2019-1125 name.
Bitdefender has claimed that it has "worked with Intel for more than a year" before publically disclosing this new attack, stating that "the SWAPGS Attack affects newer Intel CPUs that use speculative execution". Red Hat has additionally claimed that vulnerability applies to x86-64 systems which use "either Intel or AMD processors".
SWAPGS allows attackers to gain access to information that's stored in kernel memory, which could extend to passwords, encryption keys and other pieces of important information. This vulnerability is said to only be available to local attackers, with the Linux OS being considered more secure from the vulnerability than Windows.
Users of Windows 10 should update their OS to ensure that their systems remain secure. On July 9th, Microsoft released an OS update that's designed to mitigate the effects of SWAPGS by changing how processors speculatively access memory.
AMD has responded to the reveal of SWAPGS with the following statement, claiming that they believe that their processors are not vulnerable to SWAPGS.
https://www.overclock3d.net/news/cp..._by_new_swapgs_speculative_execution_attack/1
Intel Impacted by new SWAPGS Speculative Execution Attack
Researchers over at Bitdefender have uncovered a new side-channel attack which impacts Intel x86 processors. This new Speculative Execution attack is called SWAPGS, and has been designated the CVE-2019-1125 name.
Bitdefender has claimed that it has "worked with Intel for more than a year" before publically disclosing this new attack, stating that "the SWAPGS Attack affects newer Intel CPUs that use speculative execution". Red Hat has additionally claimed that vulnerability applies to x86-64 systems which use "either Intel or AMD processors".
SWAPGS allows attackers to gain access to information that's stored in kernel memory, which could extend to passwords, encryption keys and other pieces of important information. This vulnerability is said to only be available to local attackers, with the Linux OS being considered more secure from the vulnerability than Windows.
Users of Windows 10 should update their OS to ensure that their systems remain secure. On July 9th, Microsoft released an OS update that's designed to mitigate the effects of SWAPGS by changing how processors speculatively access memory.
AMD has responded to the reveal of SWAPGS with the following statement, claiming that they believe that their processors are not vulnerable to SWAPGS.
https://www.overclock3d.net/news/cp..._by_new_swapgs_speculative_execution_attack/1