A new exploit related to the Spectre attacks we’ve been cataloguing since the beginning of the year has arrived, and Intel has a new plan for dealing with these events as they continue to periodically pop up. As has been the case with previous Spectre attacks, this new variant targets the behavior of microprocessors engaged in speculative execution, or the practice of performing calculations that may nor may not be actually used as a means of improving overall performance.
Ars Technica has written an excellent explainer on this specific exploit, which deals with speculative buffer overflow. Like a normal buffer overflow, a speculative buffer overflow attempts to write data beyond the defined boundary of an array with the goal of executing code in a memory space where it shouldn’t be. Intel CPUs are allowed to perform a speculative write to read-only memory when such an operation wouldn’t be permitted under normal conditions, because it’s assumed that the speculative execution will only be used in the event it’s actually needed. Otherwise, this information and the operations based on it will be discarded — and because the data will ultimately be discarded, the need to enforce strict security protocols wasn’t followed. Previous Spectre exploits have focused on speculative reads; this new paper illustrates that speculative writes are also vulnerable.
The good news is, there are various mitigation techniques that can be deployed to resolve this issue. Because this flaw involves attempting to speculatively write data into an invalid array location, one potential solution is to first test array elements to ensure they exist before attempting to write them. There are also techniques for protecting against conventional buffer overflows that can be leveraged against speculative ones. In short, this new iteration of Spectre isn’t a reason to flee for the hills — it’s another example of how Spectre isn’t one attack, but an entire class of them that attackers can leverage in many different ways.
Intel is moving to its own new strategy for disclosing Spectre-related flaws. Rather than dropping security updates at irregular intervals, The Register reports that Intel will instead adopt a similar strategy to Microsoft’s and will release quarterly updates. Quarterly Patch Tuesday, in other words. The company would still work behind the scenes with OEMs, Microsoft, and other companies to make certain patches were ready for deployment — this synchronization is intended to simplify the rollout schedule and not drag it out over a longer period of time. Based on how much confusion there was around the Meltdown and Spectre patches (and even in the newsroom, there were questions about exactly which systems and architectures had been patched at any given moment, since some patches had to be pulled and then reissued), a more measured system would be welcome.
Intel has also promised that fixes to Spectre are coming in hardware with future product launches, but we don’t know when those platforms will be available or exactly what form the fixes will take — especially when new flaws are still being found.
Dutch Intelligence Tipped off FBI, NSA on Russian Cyber Attacks
The US has been certain the Russians hacked the DNC and State Department, and now we know part of why. It was Dutch intelligence operatives that hacked into some of Russia's own institutions — including their closed-circuit television cameras.
A New Wave of Spectre-Class Attacks May Be Coming for Intel CPUs
A new set of CPU vulnerabilities could be inbound, with up to eight different attacks said to target Intel CPUs — but we'd recommend adopting a wait-and-see approach.
Serious Rowhammer Attacks Can Now Be Carried Out Remotely
Memory corrupting techniques used for local attacks can now be launched remotely, with no need for privilege escalation or direct system access.
North Korea Targeting Defectors with Android Malware Attacks
The attack likely infected around 100 targets, which isn't a huge number compared with most malware campaigns. However, these were all highly targeted infiltrations to gather intelligence on political opponents.