Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


Sign in to follow this  
monroe

CPU Kernel Page Table Isolation bug disclosure

Recommended Posts

Posted (edited)

Thanks for the direct links. Both file headers are "%PDF-1.5". SumatraPDF (all versions from 0.9.0 up) works with no complaints. I'll see about compiling the test code into an app for Win95+.

Courtesy of Google:

This is the html version of the file https://meltdownattack.com/meltdown.pdf.
Google automatically generates html versions of documents as we crawl the web.

This is the html version of the file https://spectreattack.com/spectre.pdf.
Google automatically generates html versions of documents as we crawl the web.

FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
This is the html version of the file https://eprint.iacr.org/2013/448.pdf.

Edited by jumper
Google webcache links added.

Share this post


Link to post
Share on other sites

On 1/5/2018 at 6:55 PM, jumper said:

SpecuCheck doesn't check for the vulnerabilities, it checks for a patch. No patch for Win<7, so no reason for a Win<7 SpecuCheck.

From https://github.com/ionescu007/SpecuCheck/blob/master/README.md:

That is the case for a lot of vulnerability checkers, they just see if a patch/update is installed by detecting it directly OR detecting what the patched behaviour should be and doing nothing if it is the wrong response besides throwing an error. In other words, they do not actually perform an action to trigger the vulnerability itself. So there is no real way to check any system to see if it is vulnerable, especially the things everyone seems to want to ignore being 32bit OS and stuff older than Windows 7.

Hopefully someone finds a way to do a PoC detection on the issue so people can test these OSes.

  • Like 1

Share this post


Link to post
Share on other sites

You know what's funny about the MS's software patch for these vulnerabilities? They don't offer it unless anti-virus software (or you) sets a specific registry setting. So if you don't run any anti-virus, including Windows Defender, you don't get it (or any subsequent patches, according to MS).

A measure to prevent blue screens caused by incompatible anti-virus software therefore applies to users that don't run incompatible software in the first place.

https://support.microsoft.com/en-hk/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in

Edit: should've pasted https://support.microsoft.com/en-sg/help/4072699/january-3-2018-windows-security-updates-and-antivirus-software

Edited by UCyborg

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

Sign in to follow this  

  • Recently Browsing   0 members

    No registered users viewing this page.

×