Sampei.Nihira Posted January 10, 2018 Share Posted January 10, 2018 (edited) https://www.ashampoo.com/en/eur/pin/1304/security-software/spectre-meltdown-cpu-checker Not work on Windows XP. @Dibya Is it possible to recompile the software to make it work? TH. Edited January 10, 2018 by Sampei.Nihira 1 Link to comment Share on other sites More sharing options...
HarryTri Posted January 10, 2018 Share Posted January 10, 2018 I'm on Windows 8, thanks for pointing to the utility anyways! Link to comment Share on other sites More sharing options...
404notfound Posted January 10, 2018 Share Posted January 10, 2018 Crashes after changing EXE header to run in XP(no extra functions in import section). My guess is dynamically loaded functions. Link to comment Share on other sites More sharing options...
Destro Posted January 11, 2018 Share Posted January 11, 2018 (edited) I tired it and I don't trust it cuz I ran a VM and said i was vulnerable. The Meltdown attack cannot be used to break out of a virtual machine. You can break out of a container, sandbox, or a paravirtualized system, but performing the Meltdown attack in a fully-virtualized system just gets you access to that VM's kernel memory, not the host's kernel memory. Spectre can break out of VMs but my host machine is AMD. So all of these detection methods seem jacked to me. Edited January 11, 2018 by Destro Link to comment Share on other sites More sharing options...
Dibya Posted January 11, 2018 Share Posted January 11, 2018 On 1/10/2018 at 4:42 PM, Sampei.Nihira said: https://www.ashampoo.com/en/eur/pin/1304/security-software/spectre-meltdown-cpu-checker Not work on Windows XP. @Dibya Is it possible to recompile the software to make it work? TH. It is closed source . I will try some binary patch. Link to comment Share on other sites More sharing options...
Sampei.Nihira Posted January 11, 2018 Author Share Posted January 11, 2018 (edited) On Wilders we have discovered that: Ashampoo Spectre Meltdown CPU Checker change the Powershell ExecutionPolicy. SpeculationControl change the Powershell ExecutionPolicy.SpecuCheck not change the Powershell ExecutionPolicy. To use SpecuCheck correctly on W.XP, the KB968930 must be installed. This requires Net Framework 2. @Dibya Can you recompile the new version for it to work on XP? TH. https://github.com/ionescu007/SpecuCheck/releases/tag/1.0.5 Edited January 11, 2018 by Sampei.Nihira Link to comment Share on other sites More sharing options...
HarryTri Posted January 11, 2018 Share Posted January 11, 2018 (edited) 19 hours ago, Destro said: The Meltdown attack cannot be used to break out of a virtual machine. You can break out of a container, sandbox, or a paravirtualized system, but performing the Meltdown attack in a fully-virtualized system just gets you access to that VM's kernel memory, not the host's kernel memory. Yes but the VM's kernel memory must be protected too (that's why VMware, VirtualBox etc. are releasing patches or patched versions - and you must patch the guest OS too of course). Edited January 11, 2018 by HarryTri Link to comment Share on other sites More sharing options...
Destro Posted January 11, 2018 Share Posted January 11, 2018 (edited) 2 hours ago, HarryTri said: Yes but the VM's kernel memory must be protected too (that's why VMware, VirtualBox etc. are releasing patches or patched versions - and you must patch the guest OS too of course). I was running it on a AMD hyperviser so thats irrelevant AMDs are not susceptible to meltdown, All of these detector programs don't check to see if your CPUs are vulnerable, becasue they are not made from a meltdown or spectre sample code. They only check to see if you are patched,. Which is irrelevant in some cases. For example P4s do not do side channel. That technology doesn't exist is core duos or pIIIs either. Edited January 11, 2018 by Destro Link to comment Share on other sites More sharing options...
HarryTri Posted January 12, 2018 Share Posted January 12, 2018 Perhaps their manufacturers didn't have old CPUs in mind. Link to comment Share on other sites More sharing options...
erpdude8 Posted June 21, 2018 Share Posted June 21, 2018 (edited) also, no specific Meltdown & Spectre patches will be made for POSReady 2009 XP as noted in MS KB article 4073757 (on FAQ question - My operating system (OS) is not listed. When can I expect a fix to be released?) Quote We will not be issuing updates for the following platforms: Windows operating systems that are currently out of support or those entering end of service (EOS) in 2018 Windows XP-based systems including WES 2009, POSReady 2009 Although Windows XP-based systems are affected products, Microsoft is not issuing an update for them because the comprehensive architectural changes that would be required would jeopardize system stability and cause application compatibility problems. We recommend that security-conscious customers upgrade to a newer supported operating system to keep pace with the changing security threat landscape and benefit from the more robust protections that newer operating systems provide. Edited June 21, 2018 by erpdude8 Link to comment Share on other sites More sharing options...
Recommended Posts