Intel Vulnerability: Hijacking Transient Execution with Load Value Injection
Another day, another Intel exploit.
LVI is a new class of transient-execution attacks exploiting microarchitectural flaws in modern processors to inject attacker data into a victim program and steal sensitive data and keys from Intel SGX, a secure vault in Intel processors for your personal data.
LVI turns previous data extraction attacks around, like Meltdown, Foreshadow, ZombieLoad, RIDL and Fallout, and defeats all existing mitigations. Instead of directly leaking data from the victim to the attacker, we proceed in the opposite direction: we smuggle — "inject" — the attacker's data through hidden processor buffers into a victim program and hijack transient execution to acquire sensitive information, such as the victim’s fingerprints or passwords.
[...]
LVI in 4 simple steps:
1. Poison a hidden processor buffer with attacker values.
2. Induce a faulting or assisted load in the victim program.
3. The attacker's value is transiently injected into code gadgets following the faulting load in the victim program.
4. Side channels may leave secret-dependent traces, before the processor detects the mistake and rolls back all operations.
Source: https://lviattack.eu/
Comments
May the Ryzen with you, Amen.
Free NAT KVM | Free NAT LXC
https://inceptionhosting.com
Please do not use the PM system here for Inception Hosting support issues.
Haha. I suppose for those still owning leaky barges, it's a small comfort to know where the leaks are and how critical they are, should the barges sink.