Recently discovered by researchers at Microsoft and Google, two new versions of Spectre attack that affects the processors by AMD, ARM, IBM, and Intel. This new flaw, being named SpectreNG is related to Meltdown and Spectre which were discovered early last year. These flaws were discovered by Google and Microsoft researchers independently and were named Variant 3a and 4.
“…relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor’s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.”
“An attacker who has successfully exploited this vulnerability may be able to read privileged data across trust boundaries,”
There is also this video, to explain further:
https://youtu.be/Uv6lDgcUAC0
---Sh7nk-Z0id
- Variant 1: bounds check bypass (CVE-2017-5753) aka Spectre v1
- Variant 2: branch target injection (CVE-2017-5715) aka Spectre v2
- Variant 3: rogue data cache load (CVE-2017-5754) aka Meltdown
- [b]Variant 3a: rogue system register read (CVE-2018-3640)[/b]
- [b]Variant 4: speculative store bypass (CVE-2018-3639) aka SpectreNG[/b]
“…relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor’s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.”
“An attacker who has successfully exploited this vulnerability may be able to read privileged data across trust boundaries,”
There is also this video, to explain further:
https://youtu.be/Uv6lDgcUAC0
---Sh7nk-Z0id
01001001 00100000 01000001 01001101 00100000 01011010 01001111 01000100 01001001 01000001 01000011