Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Intel Software Hardware Linux

Intel Cache Poisoning Is Dangerously Easy On Linux 393

Julie188 writes "A researcher recently released proof-of-concept code for an exploit that allows a hacker to overrun an Intel CPU cache and plant a rootkit. A second, independent researcher has examined the exploit and noted that it is so simple and so stealthy that it is likely out in the wild now, unbeknownst to its victims. The attack works best on a Linux system with an Intel DQ35 motherboard with 2GB of memory. It turns out that Linux allows the root user to access MTR registers incredibly easily. With Windows this exploit can be used, but requires much more work and skill and so while the Linux exploit code is readily available now, no Windows exploit code has, so far, been released or seen. This attack is hardware specific, but unfortunately, it is specific to Intel's popular DQ35 motherboards."
This discussion has been archived. No new comments can be posted.

Intel Cache Poisoning Is Dangerously Easy On Linux

Comments Filter:
  • by to6o ( 838477 ) on Wednesday April 22, 2009 @03:49PM (#27678095) Homepage
    Even scarier, you can boot from a pen drive, where you have root access and just plant the thing
  • Hell has frozen over (Score:2, Interesting)

    by theorem4 ( 1101729 ) on Wednesday April 22, 2009 @03:56PM (#27678219)
    Could it be that Windows is actually safer?
  • SMM buried rootkits (Score:3, Interesting)

    by rs232 ( 849320 ) on Wednesday April 22, 2009 @03:57PM (#27678237)
    "The significance of SMM buried rootkits is that you can remove and shred the hard drive of your compromised machine, replace it with a new one, do a fresh install, and still be compromised"

    How big of a rootkit can fit in SMM memory and how does this survive a power off?
  • by Anonymous Coward on Wednesday April 22, 2009 @04:00PM (#27678277)

    Serious fear mongering.

    Vulnerabilities affect secure computers. This is not a vulnerability. At most, its a shady way to build (and perhaps sell) a compromised computer.

    This applies to all operating systems. Don't trust factory installs. Always build your environments from scratch -- the extra work will help you understand them. Without trust at the beginning you don't have it, ever.

  • by Anonymous Coward on Wednesday April 22, 2009 @04:14PM (#27678479)

    Yet again, OpenBSD [openbsd.org] shows foresight by having this bugginess fixed in 2003 long before the actual chips were available on which this can happen. Well done, lads.
  • by piojo ( 995934 ) on Wednesday April 22, 2009 @04:19PM (#27678535)

    I would recommend that you don't give out root access to script kiddies on systems where you don't want them to install root kits.

    Is it so hard to write a daemon that essentially does "do sudo install_rootkit; sleep 5; while [ $? -ne 0 ]". The syntax may be wrong, but it just tries running sudo until it works. In most systems, sudo permissions are system-wide--once a user uses sudo to install some software, the daemon will succeed in its attempt to get root. Is there a reason this won't work on most linux desktop systems? (Obviously it won't work if the affected account doesn't have sudo.)

  • by OrangeTide ( 124937 ) on Wednesday April 22, 2009 @04:21PM (#27678561) Homepage Journal

    or poke the MTRR...

  • by zx-15 ( 926808 ) on Wednesday April 22, 2009 @04:23PM (#27678583)

    I don't think it's the issue of Windows being more secure, rather of Linux exposing more of underlying hardware. Since it is a proof-of-concept exploit, it's much easier to write a shell script for linux that does the job as opposed to hunting down some obscure windows API that do the same thing, plus you've got source code for the kernel so you know exactly what has to be done.

  • by dave562 ( 969951 ) on Wednesday April 22, 2009 @04:27PM (#27678645) Journal
    So what you're saying is that if I lease space from a hosting company that has my VM on a system with a DQ35 board, I can jump from my VM into any other VMs that happen to be on the same box?
  • by Weaselmancer ( 533834 ) on Wednesday April 22, 2009 @04:53PM (#27679021)

    Ah, I gotcha. Use /proc on Linux, but you'll need to read/write to some address with assembly on Windows. Got it.

    But a thought occurs to me though...

    Everybody thinks you can get to it through /proc? Good.

    Just go into whatever driver code that handles the MTRR /proc filesystem and have it spoof writes. The invading rootkit will think "all is swell", and it won't be.

    Of course any utilities that expect a working proc for MTRR will bomb, but other than that a patch for this should be trivial.

    #ifdef HARDWARE_DQ35 ...

  • Here's what I see (Score:3, Interesting)

    by erroneus ( 253617 ) on Wednesday April 22, 2009 @04:57PM (#27679071) Homepage

    Like so many others, this is an Intel problem.

    I just finished reading up on what SMM is and that it can potentially be used to trash a BIOS, or worse, rewrite a BIOS so that it includes something along the lines of a hypervisor that can then run all kinds of things while at the same time allowing the regular OS to run.

    The comment about Linux making it easier than Windows to exploit this? Kudos for Linux!! Okay, root is required to get to run the exploit code, but after that it is "easy." That's exactly what it should be. We don't need the OS getting in our way when we want to do things with our machines. If Windows makes it harder, that's just sad... but probably necessary. There are few things in Linux that run as root unnecessarily, so running anything as root is usually no accident and isn't usually the result of a process running as root being exploited. (This is typically not the case with Windows... too often processes must run as Administrator and those processes are routinely attacked and exploited.) The threat is fairly minimal... unless someone intentionally weakened their systems for convenience. Sad for those people.

    But this is ultimately limited by the hardware all of this is running on. Older hardware is not affected. Newer hardware will not likely be affected either... and you can probably expect some sort of fix from Intel as well.

    It is an important story and it keeps people thinking in the right ways. The idea that this is a Linux vulnerability is a pathetic assertion. I am all for disclosing and eliminating problems with Linux. The quicker we know about it, the quicker it is fixed. But this is a rather limited scope and when all factors are combined, it makes this a very VERY limited problem.

  • Re:Linux (Score:3, Interesting)

    by Bert64 ( 520050 ) <bert@[ ]shdot.fi ... m ['sla' in gap]> on Wednesday April 22, 2009 @05:08PM (#27679203) Homepage

    Well, if you're running any other os and someone has root equivalent access, they could easily upload a minimal linux distro, configure your bootloader to silently start it at the next boot and then install the rootkit, followed by rebooting into whatever normal os you have...
    In short, if someone has root level access to your machine, you are screwed whatever os you run.

  • unfortunate? (Score:2, Interesting)

    by erase ( 3048 ) on Wednesday April 22, 2009 @05:08PM (#27679207) Homepage

    "This attack is hardware specific, but unfortunately, it is specific to Intel's popular DQ35 motherboards."

    that seems unfortunate only to those who have a DQ35 motherboard. for everyone else, it's fortunate that it's specific to just those boards.

  • Re:Linux (Score:1, Interesting)

    by speculatrix ( 678524 ) on Wednesday April 22, 2009 @05:09PM (#27679223)
    $ sudo rm -rf /

    You appear to be trying to destroy your system.
    Allow or cancel?
  • Re:Article Is Bunkum (Score:4, Interesting)

    by RiotingPacifist ( 1228016 ) on Wednesday April 22, 2009 @05:17PM (#27679371)

    but can root, make a file he himself can't (re)move?
    The answer ofc is yes [securityfocus.com]
    .'. root > god
    QED

  • Re:Linux (Score:5, Interesting)

    by AVee ( 557523 ) <slashdotNO@SPAMavee.org> on Wednesday April 22, 2009 @05:18PM (#27679385) Homepage
    Indeed, the potential this has to cross-infect VM is the biggest issue here. It's more then just another way to hide a rootkit, it totally breaks all that added security you where supposed to get through virtualization. Oh, and it makes running a honeypot on a DQ35 system an extremly bad^H^H^Hinteresting idea ;)
  • by stevied ( 169 ) * on Wednesday April 22, 2009 @05:25PM (#27679479)

    Did nobody notice the little side bar that starts "About Microsoft Subnet Blog .. The Microsoft Subnet blog is the official blog of the Network World's Microsoft Subnet community, managed by editor Julie Bort. Microsoft Subnet is the independent voice of Microsoft customers ..."

    Am I paranoid or does that scream "astroturfing operation" to anybody else?

  • by anss123 ( 985305 ) on Wednesday April 22, 2009 @06:44PM (#27680459)
    To run code in kernel space on Vista x64 it needs to be signed. That will prevent exploits that needs to use kernel mode instructions, unless you find some way around the signed requirement. With Social engineering being the most popular way of getting code into the kernel the signed requirement is a simple and effective way of stopping common attacks.

    XP and x32 do not have that "protection" though.
  • Re:Linux (Score:3, Interesting)

    by vtcodger ( 957785 ) on Wednesday April 22, 2009 @07:37PM (#27681017)

    It's a religious thing I think. Unix was designed (to the extent is was designed rather than simply happening) to be run as either root or as a user with VERY limited capabilities. But it turns out that there is a need to secure it, and a lot of folks have latched onto the notion that somehow that can be done by isolating the root/admin user. They have faith that there must be an answer, and root isolation has to be it.

    As far as I can see the chances of that working are slim to none. But who knows, sometimes I'm wrong. Maybe they can make it work. I hope they can actually.

    Personally, I'm going to continue to run as root until they get most of the very numerous bugs out of their security model. Things like operations that don't appear to need root, but really do; and things that run subtly differently as root and user; and configuration files that are replicated with different contents in the root and user accounts. I reckon that I'm just not smart enough to use the security model and at the age of 70, I'm not very trainable.

    Not that I have a better idea of how to secure a desktop PC. Because I don't.

    Overall, I think that hanging a St Christopher medal on my monitor might be about as effective -- and a lot less of a PITA.

    ===

    And I seem to be missing something. If there is a keylogger running, isn't the system already compromised? Even assuming that only the user account is compromised and that a hacker exists smart enough to compromise my user account but too dumb to escalate privileges, exactly how does that help ME out? It's not like my sensitive data is secured in the root account.

  • Re:Linux (Score:5, Interesting)

    by annodomini ( 544503 ) <lambda2000@yahoo.com> on Thursday April 23, 2009 @01:31AM (#27683495) Homepage

    If an attacker can run code as your user account, then they can insert alias sudo=evilpasswordstealingsudo (as well as alias su=evilpasswordstealingsu) into your .bashrc and wait for you to start a new shell and run one of those commands.

    Basically, if an attacker gets local access to an account that is ever used to privilege escalate to root, then the attacker can get root. And even if not, there are frequently local root exploits (like a recent udev bug [lwn.net]) that can escalate ordinary user privileges to root privileges. You should always assume that once an attacker has some access to a machine, that they can root it; treat any kind of remote-code execution exploit as if it were a remote root, and treat any kind of privilege escalation exploit as a remote root (since if one exists, there's a high probability that the other does too).

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...