<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>CVE-2020-0551 — LowEndSpirit</title>
        <link>https://staging.lowendspirit.com/index.php?p=/</link>
        <pubDate>Mon, 06 Apr 2026 15:34:37 +0000</pubDate>
        <language>en</language>
            <description>CVE-2020-0551 — LowEndSpirit</description>
    <atom:link href="https://staging.lowendspirit.com/index.php?p=/discussions/tagged/cve-2020-0551/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Intel Vulnerability: Hijacking Transient Execution with Load Value Injection</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/774/intel-vulnerability-hijacking-transient-execution-with-load-value-injection</link>
        <pubDate>Wed, 11 Mar 2020 18:01:00 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>souen</dc:creator>
        <guid isPermaLink="false">774@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Another day, another Intel exploit.</p>

<blockquote><div>
  <p>LVI is a new class of transient-execution attacks exploiting microarchitectural flaws in modern processors to inject attacker data into a victim program and steal sensitive data and keys from Intel SGX, a secure vault in Intel processors for your personal data.</p>
  
  <p>LVI turns previous data extraction attacks around, like Meltdown, Foreshadow, ZombieLoad, RIDL and Fallout, and defeats all existing mitigations. Instead of directly leaking data from the victim to the attacker, we proceed in the opposite direction: we smuggle — "inject" — the attacker's data through hidden processor buffers into a victim program and hijack transient execution to acquire sensitive information, such as the victim’s fingerprints or passwords.</p>
  
  <p>[...]</p>
  
  <p>LVI in 4 simple steps:<br />
  1. Poison a hidden processor buffer with attacker values.<br />
  2. Induce a faulting or assisted load in the victim program.<br />
  3. The attacker's value is transiently injected into code gadgets following the faulting load in the victim program.<br />
  4. Side channels may leave secret-dependent traces, before the processor detects the mistake and rolls back all operations.</p>
</div></blockquote>

<p>Source: <a href="https://lviattack.eu/" rel="nofollow">https://lviattack.eu/</a></p>
]]>
        </description>
    </item>
   </channel>
</rss>
