Quick summary on Meltdown and Spectre critical vulnerabilities in modern processors

Thanh Nguyen
tradahacking
Published in
2 min readJan 4, 2018

Summary

Variants of CPU data cache timing issues are known to affect many modern processors, including certain processors by Intel, AMD and ARM. The attacks, named Spectre and Meltdown, are reported 6++ months ago by a group of researchers and Google Project Zero which could be used to leak information out of mis-speculated execution, leading to arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.

Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory. Consequently, applications can access system memory. Meltdown works on Intel processors.

Meltdown in Action: Dumping memory

Spectre tricks other applications into accessing arbitrary locations in their memory. Spectre works on most of modern microprocessors, including non-Intel processors (AMD and ARM processors). Spectre looks harder to exploit but no easy fix.

The Linux’s KPTI (aka KAISER) patch has been widely applied as a mitigation to the Meltdown attack and Spectre (partly). KAISER patch will affect performance for anything that does system calls or interrupts, slow down system performance from 5–30% depending on the task and the CPU models.

CVEs: CVE-2017–5754, CVE-2017–5753, CVE-2017–5715

Vendor Responses

Intel

AMD

ARM

Patches

Links

--

--

Thanh Nguyen
tradahacking

Founder at VNSecurity | Interested in Security & BioHacking.