Kitz ADSL Broadband Information
adsl spacer  
Support this site
Home Broadband ISPs Tech Routers Wiki Forum
 
     
   Compare ISP   Rate your ISP
   Glossary   Glossary
 
Please login or register.

Login with username, password and session length
Advanced search  

News:

Pages: 1 ... 3 4 [5] 6 7 8

Author Topic: Serious vulnerability discovered in Intel processors  (Read 21323 times)

Weaver

  • Senior Kitizen
  • ******
  • Posts: 11459
  • Retd s/w dev; A&A; 4x7km ADSL2 lines; Firebrick
Re: Serious vulnerability discovered in Intel processors
« Reply #60 on: January 07, 2018, 12:47:04 AM »

Just to clarify, as I think what I wrote was ambiguous- I agree 100% with kitz, I meant to say not "do nothing" but "make it configurable". :-)
Logged

banger

  • Kitizen
  • ****
  • Posts: 1186
  • TTB 80/20
Re: Serious vulnerability discovered in Intel processors
« Reply #61 on: January 07, 2018, 01:42:04 AM »

What MS Script is that?  Is there a link please?

Couldn't find the link to the MS page but the below link has all the info. Mind you getting the script to run is a minefield on its own as you might have to set execution policy to remotesigned for it to run in admin powershell.

https://betanews.com/2018/01/05/microsoft-powershell-meltdown-spectre-script/
Logged
Tim
talktalkbusiness.net & freenetname
Asus RT-AC68U and ZyXEL VMG1312-B10A Bridge on 80 Meg TTB Fibre

https://www.thinkbroadband.com/speedtest/1502566996147131655

Chrysalis

  • Content Team
  • Addicted Kitizen
  • *
  • Posts: 7409
  • VM Gig1 - AAISP CF
Re: Serious vulnerability discovered in Intel processors
« Reply #62 on: January 07, 2018, 11:41:29 AM »

yeah if you set remotesigned to run it then disable again after
Logged

highpriest

  • Reg Member
  • ***
  • Posts: 285
Re: Serious vulnerability discovered in Intel processors
« Reply #63 on: January 07, 2018, 02:21:38 PM »

Logged
Zen | Zyxel VMG8324-B10A (with RFC4638 patch) | EdgeRouter PoE | UniFi AP AC Pro + Lite

highpriest

  • Reg Member
  • ***
  • Posts: 285
Re: Serious vulnerability discovered in Intel processors
« Reply #64 on: January 07, 2018, 02:31:47 PM »

If you don't have PowerShell/WMF 5.x, there is a downloadable version available:

https://gallery.technet.microsoft.com/scriptcenter/Speculation-Control-e36f0050
Logged
Zen | Zyxel VMG8324-B10A (with RFC4638 patch) | EdgeRouter PoE | UniFi AP AC Pro + Lite

broadstairs

  • Kitizen
  • ****
  • Posts: 3700
Re: Serious vulnerability discovered in Intel processors
« Reply #65 on: January 07, 2018, 02:57:04 PM »

Just tried the downloadable version but it will not run on Windows 7 SP1 Home Premium, gave errors about manifest.

Stuart
Logged
ISP:Vodafone Router:Vodafone Wi-Fi hub FTTP

burakkucat

  • Respected
  • Senior Kitizen
  • *
  • Posts: 38300
  • Over the Rainbow Bridge
    • The ELRepo Project
Re: Serious vulnerability discovered in Intel processors
« Reply #66 on: January 07, 2018, 04:38:58 PM »

A useful blog posting documenting the current (as of Jan 6, 2018) Meltdown and Spectre Linux Kernel Status by Greg Kroah-Hartman.
Logged
:cat:  100% Linux and, previously, Unix. Co-founder of the ELRepo Project.

Please consider making a donation to support the running of this site.

banger

  • Kitizen
  • ****
  • Posts: 1186
  • TTB 80/20
Re: Serious vulnerability discovered in Intel processors
« Reply #67 on: January 08, 2018, 11:48:53 PM »

@Kitz was the script useful to you?
Logged
Tim
talktalkbusiness.net & freenetname
Asus RT-AC68U and ZyXEL VMG1312-B10A Bridge on 80 Meg TTB Fibre

https://www.thinkbroadband.com/speedtest/1502566996147131655

kitz

  • Administrator
  • Senior Kitizen
  • *
  • Posts: 33888
  • Trinity: Most guys do.
    • http://www.kitz.co.uk
Re: Serious vulnerability discovered in Intel processors
« Reply #68 on: January 09, 2018, 11:54:13 AM »

I didn't get any further than the error message about running scripts and unauthorised access.  :/

As I know my i76700K is one of the affected... and since Windows successfully updated KB4056892 a couple of evenings ago I didn't bother messing any more :/
Logged
Please do not PM me with queries for broadband help as I may not be able to respond.
-----
How to get your router line stats :: ADSL Exchange Checker

Ronski

  • Helpful
  • Kitizen
  • *
  • Posts: 4308
Re: Serious vulnerability discovered in Intel processors
« Reply #69 on: January 09, 2018, 06:45:04 PM »

Here's what mine says after applying the Windows Update.

Code: [Select]
Speculation control settings for CVE-2017-5715 [branch target injection]

Hardware support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: False
Windows OS support for branch target injection mitigation is disabled by system policy: False
Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID performance optimization is enabled: True [not required for security]

Suggested actions

 * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.


BTIHardwarePresent             : False
BTIWindowsSupportPresent       : True
BTIWindowsSupportEnabled       : False
BTIDisabledBySystemPolicy      : False
BTIDisabledByNoHardwareSupport : True
KVAShadowRequired              : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled           : True

So what does all that actually mean?
Logged
Formerly restrained by ECI and ali,  now surfing along at 550/52  ;D

renluop

  • Kitizen
  • ****
  • Posts: 3326
Re: Serious vulnerability discovered in Intel processors
« Reply #70 on: January 09, 2018, 08:12:48 PM »

@Ronski What is the "mine" referring to in your last post?
Logged

banger

  • Kitizen
  • ****
  • Posts: 1186
  • TTB 80/20
Re: Serious vulnerability discovered in Intel processors
« Reply #71 on: January 09, 2018, 08:15:02 PM »

It means you need a BIOS update as your cpu microcode needs updating. What CPU are you running Ronski? MSI support have told me my motherboard isn't affected (too old) not sure I believe them.
Logged
Tim
talktalkbusiness.net & freenetname
Asus RT-AC68U and ZyXEL VMG1312-B10A Bridge on 80 Meg TTB Fibre

https://www.thinkbroadband.com/speedtest/1502566996147131655

Ronski

  • Helpful
  • Kitizen
  • *
  • Posts: 4308
Re: Serious vulnerability discovered in Intel processors
« Reply #72 on: January 10, 2018, 06:28:28 AM »

@Ronski What is the "mine" referring to in your last post?

It's referring to the results of running the previously mentioned script on my main PC. Although we have 6 desktop PC's, 1 laptop and a server here at home.

@Banger Yes I see it suggests a BIOS upgrade is required, but does it mean the Windows patch is not protecting this particular PC? I really need to read up to see just what the implications are and just how vulnerable we are.

This particular PC has an ASRock Fatal1ty X99M Killer 3.1 motherboard with an Intel i7-5820k, and there's no recent BIOS updates so I'll have to ask them.
Logged
Formerly restrained by ECI and ali,  now surfing along at 550/52  ;D

renluop

  • Kitizen
  • ****
  • Posts: 3326
Re: Serious vulnerability discovered in Intel processors
« Reply #73 on: January 10, 2018, 09:05:02 AM »

Well it seems scripts are disabled, and seeing the comments I'm non too sure about the solutions offered.
Maybe I best leave it alone! :-\ :(
Logged

niemand

  • Kitizen
  • ****
  • Posts: 1836
Re: Serious vulnerability discovered in Intel processors
« Reply #74 on: January 10, 2018, 09:36:06 AM »

If using Chrome https://support.google.com/chrome/answer/7623121?hl=en-GB is probably a good idea. Comes with a hit on resources, naturally.

The patch will, however, prevent rogue Spectre-abusing scripts running on a browser and plundering the memory of other sites - it isolates every site and, indeed, frame, within its own process and the Spectre exploits as far as I'm aware cannot jump out of their own process context.

Meltdown received the coverage because it is, by a mile, worse in terms of impact and easier to exploit. Spectre can be mitigated to some extent through recompilation of binaries and ensuring appropriate isolation of workloads to processes.

EDIT: Microsoft have recently implemented something similar in MS Edge and IE 11. Grab those patches.
« Last Edit: January 10, 2018, 09:38:29 AM by Ignitionnet »
Logged
Pages: 1 ... 3 4 [5] 6 7 8
 

anything