Red Security

Full Version: Microsoft and Google Reveal New Spectre Attack
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Recently discovered by researchers at Microsoft and Google, two new versions of Spectre attack that affects the processors by AMD, ARM, IBM, and Intel. This new flaw, being named SpectreNG is related to Meltdown and Spectre which were discovered early last year. These flaws were discovered by Google and Microsoft researchers independently and were named Variant 3a and 4.
  • Variant 1: bounds check bypass (CVE-2017-5753) aka Spectre v1

  • Variant 2: branch target injection (CVE-2017-5715) aka Spectre v2

  • Variant 3: rogue data cache load (CVE-2017-5754) aka Meltdown

  • [b]Variant 3a: rogue system register read (CVE-2018-3640)[/b]

  • [b]Variant 4: speculative store bypass (CVE-2018-3639) aka SpectreNG[/b]
RedHat had this to say about SpectreNG:

“…relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor’s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.”

“An attacker who has successfully exploited this vulnerability may be able to read privileged data across trust boundaries,”


There is also this video, to explain further:

https://youtu.be/Uv6lDgcUAC0


---Sh7nk-Z0id