Meltdown and Spectre are hardware design vulnerabilities in CPUs utilizing speculative execution.
While the defect exists in the hardware, mitigations in operating systems are possible and are currently available.
CPU hardware implementations are vulnerable to side-channel attacks referred to as Meltdown and Spectre. The issues are organized into three variants:
- CVE-2017-5753, Spectre Variant 1: CPUs utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- CVE-2017-5715, Spectre Variant 2: Branch target injection
- CVE-2017-5754, Meltdown: allows attackers to read arbitrary physical memory (including kernel memory) from an unprivileged user process.
These attacks are possible due to the interaction between operating system memory management and CPU implementation optimization choices.
The Linux kernel mitigations for this vulnerability are referred to as KAISER, and subsequently KPTI, which aim to improve separation of kernel and user memory pages.
Exposure and Impact
Remediation & Mitigation
Vendors are releasing patches for vulnerable systems and cloud environments like Amazon and Azure are patching the operating systems they deliver.
ASPL-759 shipped on January 5, 2018 contained checks for the following products:
- Microsoft Windows Patches/Mitigations for CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 (x64 only)
- Microsoft SQL Server 2016 & 2017 Patches/Mitigations for CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
- RHEL Patches/Mitigations for CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
- CentOS Patches/Mitigations for CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
- VMware ESXi (Read more...)
This is a Security Bloggers Network syndicated blog post authored by Lamar Bailey. Read the original post at: The State of Security