Results 1 to 2 of 2

Thread: Rootkit hole left in Intel processors for 16 years

  1. #1
    Join Date
    Sep 2012
    Location
    Adelaide Hills
    Posts
    13,383
    Total Downloaded
    0

    Rootkit hole left in Intel processors for 16 years

    not often something like this comes up


    Memory sinkhole leaves older chips permanently vulnerable.
    Intel processors made between 1995 and 2011 contain a serious design flaw that could be used to install invisible rootkits, a researcher has discovered.
    According to Christopher Domas, a security researcher with the Battelle Memorial Institute, the design flaw in Intel's processors can be exploited to install malware below operating systems and antivirus, which would be unable to detect it.
    The mistake was introduced in in the Pentium Pro processor, released in 1995. Hardwired into the silicon, it has been staring kernel-level programmers in the face for years, Domas said.
    "It's a forgotten patch to a forgotten problem, but opens up an incredible vulnerability," Domas said when he revealed the hardware bug at the Black Hat conference in Las Vegas last week.
    The flaw allows attackers to run rootkit code at the lowest level on the computer, out of reach of the operating system, applications and hypervisors.
    Specifically, the exploit for the flaw targets the low-level system management mode (SMM) in processors.
    Domas discovered that accesses to system management memory could read and write to the local advanced programmable interrupt controller (LAPIC), something not normally allowed by hardware protections.
    Domas was able to ultimately create a memory sinkhole where writes to it were discarded and reading from it returns a zero; with a special operating system driver, he managed to install a rootkit into the SMM.
    Among other things, the rootkit could quietly oversee and record the user's every keypress, mouse click and download. Efforts to find and remove the rootkit from a computer can be blocked by the malware.
    Intel spotted the error in its processor blueprints and corrected the issue in 2011. Chips built from January that year and onwards are not affected.
    According to security specialist Jacob Torrey, operating systems can easily mitigate against the security hole at the hypervisor or virtual memory manager level, protecting themselves from criminals exploiting the design flaw.
    Newer operating systems could easily introduce a patch for vulnerable Intel processors, Torrey noted.
    Millions of Intel processors in older PCs and aging laptops are permanently vulnerable and cannot be updated - newer devices based on the Sandy Bridge architecture are not affected by the flaw.
    Current Cars:
    2013 E3 Maloo, 350kw
    2008 RRS, TDV8
    1995 VS Clubsport

    Previous Cars:
    2008 ML63, V8
    2002 VY SS Ute, 300kw
    2002 Disco 2, LS1 conversion

  2. #2
    Join Date
    May 2003
    Location
    On The Road
    Posts
    30,032
    Total Downloaded
    0
    If you really have to know what CPU you have--

    Download CPU-Z - MajorGeeks
    "How long since you've visited The Good Oil?"

    '93 V8 Rossi
    '97 to '07. sold.
    '01 V8 D2
    '06 to 10. written off.
    '03 4.6 V8 HSE D2a with Tornado ECM
    '10 to '21
    '16.5 RRS SDV8
    '21 to Infinity and Beyond!


    1988 Isuzu Bus. V10 15L NA Diesel
    Home is where you park it..

    [IMG][/IMG]

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Search AULRO.com ONLY!
Search All the Web!