Researchers Find Critical Vulnerabilities in AMD's Ryzen and EPYC Processors, But They Gave the Chipmaker Only 24 Hours Before Making the Findings Public (cnet.com) 195
Alfred Ng, reporting for CNET: Researchers have discovered critical security flaws in AMD chips that could allow attackers to access sensitive data from highly guarded processors across millions of devices. Particularly worrisome is the fact that the vulnerabilities lie in the so-called secure part of the processors -- typically where your device stores sensitive data like passwords and encryption keys. It's also where your processor makes sure nothing malicious is running when you start your computer. CTS-Labs, a security company based in Israel, announced Tuesday that its researchers had found 13 critical security vulnerabilities that would let attackers access data stored on AMD's Ryzen and EPYC processors, as well as install malware on them. Ryzen chips power desktop and laptop computers, while EPYC processors are found in servers. The researchers gave AMD less than 24 hours to look at the vulnerabilities and respond before publishing the report. Standard vulnerability disclosure calls for 90 days' notice so that companies have time to address flaws properly. An AMD spokesperson said, "At AMD, security is a top priority and we are continually working to ensure the safety of our users as new risks arise. We are investigating this report, which we just received, to understand the methodology and merit of the findings," an AMD spokesman said. Zack Whittaker, a security reporter at CBS, said: Here's the catch: AMD had less than a day to look at the research. No wonder why its response is so vague.
Sponsored by, Intel! (R) (Score:5, Interesting)
... someone needs to dig (deep) into who registered the amdflaw domain and who is funding this.
Re:Sponsored by, Intel! (R) (Score:5, Interesting)
Re:Sponsored by, Intel! (R) (Score:5, Insightful)
Care to inform me how I would be the winner if flaws in hardware become published with ZERO chance for their makers to deliver any kind of patch before malware creators get a chance to exploit them?
Re:Sponsored by, Intel! (R) (Score:5, Informative)
Care to inform me how I would be the winner if flaws in hardware become published with ZERO chance for their makers to deliver any kind of patch before malware creators get a chance to exploit them?
The place this hole is, is the AMD version of IME, a useless piece of malware designed to remote-controlled your computer, which Intel and AMD puts there for enterprise purposes. Get rid of it from or make it default off and these issues goes away...
I have no fucking clue why they installed those crappy Internet-of-shit operating systems in there by default in the first place.
Re: (Score:2)
Exports to (insert not-so-friendly-state-here) and a government wanting to have a convenient kill switch could be a reason.
Re: (Score:2)
Being legally able and allowed to export to (country the US does not like) could offset that, easily.
Re: (Score:2)
I have no fucking clue why they installed those crappy Internet-of-shit operating systems in there by default in the first place.
Then you should start by reading the manual and going over the years of history of what bulk customers have been asking for.
Re: (Score:3)
Care to inform me how I would be the winner if flaws in hardware become published with ZERO chance for their makers to deliver any kind of patch before malware creators get a chance to exploit them?
Listing your assumptions: You assume that nobody knew about these flaws before this press release. You assume that release contained sufficient information allowing some quickly reproduce these and move into exploitation. You assume that these could be remotely exploited so your are automatically vulnerable with any kind of system. You assume that these could be successfuly patched resulting in a stable and secure system.
Some of these assumptions might turn out to be false.
Re: (Score:2)
I assume that a lot fewer hostile actors knew of this flaw before the press release and that the information is sufficient to at the very least spend resources on finding out how to exploit it. Yes. And I dare say with some confidence that this assumption is valid.
Re: (Score:2)
And that wouldn't be a lot better if we learned of this flaw AFTER AMD had time to fix it?
Re: (Score:2)
It's responsible enough for Tavis Ormandy [arstechnica.com]. You can simply make up your own shortened periods [arstechnica.com] rather than sticking to a standard 60-90 period. Just make up an excuse and fire away...
Re: (Score:2)
Well, according to CTS-Labs website and whitepaper (quoting from the whitepaper):
AMD has recently announced that EPYC and Ryzen embedded processors are being sold as high security solutions for mission-critical aerospace and defense systems. AMD's latest generation Vega GPUs, which also have Secure Processor inside of them, are being integrated as deep-learning accelerators on self-driving cars. We urge the security community to study the security of these devices in
Re:Sponsored by, Intel! (R) (Score:5, Funny)
You stole my comment!
It isn't my fault that your speculative execution and prediction thinking leaked your post idea for everyone to see.
Re: (Score:3, Insightful)
Pretty clearly Intel-funded, yes. The 24h notification period is so short that it can be classified as a malicious attack. Nobody with any understanding of how this works does this unless there are strong overriding concerns. What these corrupt a******* did makes people a lot less secure.
Re:Sponsored by, Intel! (R) (Score:5, Insightful)
Devil's Advocate: the disclosure(s) is (are) vague as hell on exploit details, let alone demonstrations or proof-of-concepts, so there is that.
All said though, still a dick move by CTS-Labs.
Re: (Score:2)
Devil's Advocate: the disclosure(s) is (are) vague as hell on exploit details, let alone demonstrations or proof-of-concepts, so there is that.
I'm not disagreeing here, and I know nothing about the details, but wouldn't that be the ideal competitor-funded FUD? "I'm not going to tell you all the details, but here's an elephant being electrocuted by AC^H^H AMD. How do you explain that, Mr. Tesla?"
Of course, what I'm doing here is Intel-FUD, so maybe I'm just a shill the other way. :^O
Re: (Score:2)
All said though, still a dick move by CTS-Labs.
Who? This is all I've ever heard of them.
Then again: Any media attention is good.
Who cares who sponsored it? (Score:2)
Violating KISS principles got Intel and AMD into this mess. There's plenty of room on the die and they're quite capable of making SMP cheap and affordable. SMP is better than multicore because each core gets more cache and more bus. They deserve what they get and I have no sympathy.
Tools to verify the hardware description language exist, they can use simulators to test the hardware, if they are skimping on QA in order to cut costs, then they have no-one to blame but themselves.
Re:Sponsored by, Intel! (R) (Score:4)
Pretty clearly? Based on what evidence? All you've done is speculated as to motive.
Re: (Score:2)
That's it. Keep attacking the source of any information that you find inconvenient. Don't prove or disprove any information yourself.
Re: (Score:2)
Adding more words does not transform speculation as to motive into evidence.
Yes, those are the only two possible explanations, and you are the arbiter of stupidity.
Re: (Score:2)
I retract that, this is far too obvious and amateur-level for Intel. This is a stock-scam.
Re: (Score:2)
Design flaws happen. Computer hardware and software are by now SO complex that it is technically impossible to create a secure chip or system that is still affordable.
Of course I can create hardware that's secure. That takes time. To give you an idea, if I had to design hardware with maximum security in mind, you could maybe today buy a CPU akin to a P4 for no more than what an average BMW would cost you.
Re:Sponsored by, Intel! (R) (Score:4, Interesting)
We could be using single cycle machines with no pipe-lining, in order execution and several megabytes of SRAM.
They would be slow but they could be they could be secure by now. We chose fast and cheap over reliable.
Re: (Score:2)
[...]We chose fast and cheap over security.
FTFY.
Re: (Score:2)
You design it using something like VHDL, Verilog or SystemC. These are amenable to verification using theorem provers. Your compiler can be written using VST and verified. This will not produce a perfect product, you only demonstrate that the source and thus the low-level hardware description match the specification. However, specifications are much easier to prove correct than complex code.
You also use extreme programming methods. In other words, develop your test harness first and then develop to the test
Re: (Score:2)
Your inability to comprehend a short comment means that the smell is all you, you stupid pile of shit.
Re: (Score:2)
The thesis is rather that freezing development at a point so you can spend years to test your system makes the chips more expensive and lower in performance.
Re:Sponsored by, Intel! (R) (Score:5, Insightful)
As opposed to Intel, whose chips are perfectly secure [wikipedia.org]. Except Intel had ~5 months to fix the problem before public disclosure (longer than responsible disclosure standards required). AMD is somehow only given 24 hours? That's not just irresponsible disclosure, that's an indirect attack.
Re: (Score:2)
It is a direct attack. I am thinking either Intel is behind this or it is for stock-price manipulation.
Re: (Score:3, Insightful)
Reporting facts is smearing someone? This is Poe’s Law, right? AMD fans are not this delusional are they?
Re: (Score:2)
It is not actually clear whether these are indeed "facts". The "whitepaper" is laughably imprecise. The company seems to be a mailbox, not more. Until this is confirmed by AMD, this is essentially a rumor. The short notification so AMD could not deny (or confirm) may be to actually use this for stock-price manipulation. As such, it is possible that the entire thing is a fake clever enough that AMD needs some time to find out whether there actually is substance to this. And that is another reason why you giv
Re: (Score:2)
Re: (Score:3, Interesting)
Yes, the combination of publication within a day and registering an AMD-denigrating domain for the purpose stinks. As others have written already, it looks like a PR hit job.
With a quick Google search (5 minutes) I could also find nothing substantial about CTS Labs. They have a professional looking website with quite a bit of Bullshit Bingo appeal, and a contact e-mail address on it.
Otherwise not much:
-no postal address
-no references from past projects
One might wo
Re: (Score:2)
Yes, the combination of publication within a day and registering an AMD-denigrating domain for the purpose stinks. . . a PR hit job. [emphasis mine] ;-)
. . .
One might wonder if this is more than a shell company
How do these tiny, unknown shell companies find zero-day flaws that no one else can?
Must be super-geniuses -- or maybe just sloppy hacks poorly covering their tracks when attempting defamation.
Re:Sponsored by, Intel! (R) (Score:4, Interesting)
Have to agree that the intent behind this super-fast disclosure looks malicious. It follows that the research was probably undertaken with malicious intent as well.
A very large chunk of Intel's operations are based in Israel, so that is one possible motivation for Israelis to go after AMD, which is based in the EU. Its widely known that the EU fined Intel over a $billion for threatening PC makers to avoid using too many AMD chips in PC products. There is revanchism and monopolist warfare going on here.
Not quite comparable to Intel's snafu (Score:5, Insightful)
So these aren't quite on par with Spectre and Meltdown.
Some firmware updates should fix almost all of this.
Still, it was sort of an asshole move to only give AMD 24 hours' notice just so they could get their 15 minutes of fame.
And, yes, it's disgusting to see AMD put out products with lots of weaknesses like this.
Re:Not quite comparable to Intel's snafu (Score:4, Interesting)
Saying they aren't on par with Spectre or Meltdown is missing the point - it's an apples to oranges comparison, just like IME's many problems aren't comparable to Spectre or Meltdown.
It's not clear that firmware updates can fix it -- it depends on whether it's something that can be updated in firmware. Many security-critical hardware designs doesn't allow firmware updates, because at that stage modifiable firmware is a security hole in and of itself.
At the end of the day, it sounds like AMD's Secure Processor has similar problems as Intel's Management Engine. It's not exactly unexpected, as every remote management 'feature' of the type has historically been riddled with security holes, regardless of vendor.
I can't help but wonder, though, what the source of "24 hours notice" is; the articles I saw don't explain. I recall in years past, there are cases where researchers tried for months to get Microsoft to take their claims seriously. Microsoft wouldn't even acknowledge them, and when the researchers released it as a zero-day, and Microsoft shrieked they weren't given any notice...
If AMD really was only given 24 hours notice, it was outrageously unprofessional and unethical behavior by the research company.
Honestly, I'm more willing to believe corporate America would lie in an attempt to CYA than researchers would act in a way so unethical that nobody will work with them in the future.
Comment removed (Score:5, Insightful)
Re:pretty lame summary (Score:4, Insightful)
Re: (Score:3)
At this point we have no idea how bad this is. Could be that AMD release a patch next week and it's all fixed, no fuss. Could be as bad as Meltdown, with a major performance hit. Or it could be complete bullshit. We just don't know.
Re: (Score:2)
I'm kind of wondering that myself. They're (somewhat fortunately) quite vague with describing the flaws... A couple of them *appear* to be remote-exploit flaws (almost couldn't give a flying fuck about local privilege escalations, save for specific circumstances I won't detail here, though you'd pretty much be able to find parallel circumstnaces in your own workworld.)
Then again, it's hard to tell at first glance. One one hand I'm glad they didn't bother with exploit POC/demonstrations, but on the other, th
Re: (Score:2)
I don't think any of them are remotely exploitable, but these days you have to worry about Javascript running locally too.
For servers local exploits are a problem too, especially those running VMs.
Re: (Score:3)
At this point we have no idea how bad this is. Could be that AMD release a patch next week and it's all fixed, no fuss. Could be as bad as Meltdown, with a major performance hit. Or it could be complete bullshit. We just don't know.
It is apparently a just a scam, the company behind had shorted AMD stocks, and have been caught and warned over similar scams in the past
Re: (Score:2)
Intel gets 6 months and AMD gets a day? (Score:5, Insightful)
This all smells fishy. Hand me the tin-foil. I need a hat.
Re: (Score:2)
Actually, there is a good technical reasons:
There are a lot of security companies in Israel. Probably in the thousands, if not more. It should come as no surprise, therefor, that some of them would be shady.
Shachar
Follow the money (Score:4, Interesting)
In collusion with intel or not, I'd bet these "researchers" have bought a bunch of intel stock over the last few months.
if you get caught money laundering (Score:2)
if you get caught money laundering your going to fpmitap
Re: (Score:2)
In collusion with intel or not, I'd bet these "researchers" have bought a bunch of intel stock over the last few months.
Or they've shorted AMD and really need to knock down the price. For what it's worth as I write this AMD's stock is actually slightly up today despite the news.
Re: (Score:2)
Well, maybe the stock-market is not so easily panicked by what at the moment amounts to hot air.
Re: (Score:3)
Are you actually implying that fund managers would have any idea what to make of this at all?
Re: (Score:2)
The company is a pile of shit- these guys are evil- but it's real, and it's a big deal.
I suspect they stand to benefit somehow from the hit against AMD, but the shit they're peddling is legit.
Re: (Score:2)
Nonsense. If somebody can put in their own BIOS or has signed drivers, then there is no need to verify anything. These are not vulnerabilities that can be fixed or are unknown or unexpected by any real expert.
Re:Follow the money (Score:5, Informative)
They literally spell it out on their disclaimer page. [amdflaws.com]
Although we have a good faith belief in our analysis and believe it to be objective and unbiased, you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports.
So while these exploits might be real, they just straight up fess to being shady as shit. This is some blackballing level of unethical behavior. They literally hit and run AMD for profit. Whoever these engineers are, this whole episode should be the end of any future career they might have had and it just stops short of what I would think would constitute an outright FTC investigation.
Twenty-four hour notice and then posting publicly the exploits isn't research, that's a willful attack.
Re: (Score:2)
They literally spell it out on their disclaimer page. [amdflaws.com]
Although we have a good faith belief in our analysis and believe it to be objective and unbiased, you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports.
So while these exploits might be real, they just straight up fess to being shady as shit. This is some blackballing level of unethical behavior. They literally hit and run AMD for profit. Whoever these engineers are, this whole episode should be the end of any future career they might have had and it just stops short of what I would think would constitute an outright FTC investigation.
Twenty-four hour notice and then posting publicly the exploits isn't research, that's a willful attack.
The exploits are reported as serious by a few independent researchers who seem to have been given extra info, but do require that you have *already* powned the target.
And, somehow a short-seller named Viceroy saw fit to put out a report advising people to short AMD stock [streetinsider.com] because they claimed to believe that this flaw would drive AMD to bankruptcy!
Definitely a money grab by CTS Labs. (I'll make a guess that Viceroy are dupes and are not intentionally doing something worth a visit from the SEC...)
Intel any thing to win! (Score:2)
Intel any thing to win! suck it up as soon you will an raid key and an pci-e lane key to unlock stuff on your cpu.
Requires complete takover first? (Score:2, Informative)
So it appears an attacker would have to have gained root/admin access over the OS before they could then install some persistent backdoor?
Attacking the TPM could be bad, but once you have kernel level access you pretty much have anything you need to steal data anyway.
This one seems to have higher barrier to entry and a lot of assumptions versus just drive-by JavaScript executing code or a malicious guest VM breaking out of a hypervisor.
I expect the CVSSv3 score to be medium.
Re: (Score:2)
Indeed. If you have root on the machine, you can basically do anything anyways.
Re: (Score:2)
Now, the chipset... that's more of a gray area... but still unsigned code execution and *installation* after a simple root exploit is pretty fucking terrible.
Re: (Score:2)
That is bullshit for those weak of mind. You can always manipulate critical components of a system. The "locked down" TPM and so are primarily to prevent people from installing non-Windows OSes. Just refer to all those TPMs from Infinion that were recently found to be insecure.
Re: (Score:2)
Plug a usb drive in to a machine, load your own OS, insert persistent undetectable malware, profit?
Re: (Score:2)
I'm wondering if the people screaming "it takes root, this is a nothingburger" are shills or... not using their entire intellectual faculties.
Re: (Score:2)
trying to make a name for themselves... (Score:5, Informative)
Re:trying to make a name for themselves... (Score:4, Interesting)
I used to be a full disclosure guy.
I grew up.
Re:trying to make a name for themselves... (Score:5, Interesting)
The sentence on the web site was probably edited from:
"Due to the sensitive nature of security vulnerabilities, we usually work under strict mutual NDAs with our customers to ensure maximum safety and privacy. If you would like to become one of our customers by handing over a signed NDA and a fat bag of money, you can contact us at the following email address. Should we find a flaw in a product that is not produced by one of our NDA partners, we'll first ask them for a fat bag of money, and if they don't immediately capitulate, we'll be publishing their dirty laundry as "full disclosure with previous notification".
Somehow I have a feeling that the "disclosure" to AMD included the offer of a mutual NDA and business-to-business financial arrangement, with AMD telling them to pound it.
Re: (Score:2)
Well, I doubt they will get many real customers. They have already demonstrated that they are willing to screw a lot of people for a bit if publicity. Will be interesting to see whether their claims actually can hold water. At the moment that looks more than doubtful.
Re: (Score:2)
I smell a conspiracy. You know who else is based in Israel? THE JEWS!!! No, just kidding. But seriously folks, who know who there's a lot of in Israel? Jews, that's who. No, no no, actually there's a lot of Intel employees and facilities in Israel [intel.com]. Intel is desperate for anything that makes them look good right now, and the next best thing is anything that makes the competition look bad. There may be Jews involved, but I suspect what's most relevant is that if there are, they're connected to Intel somehow.
Re: (Score:2)
You know who Intel couldn't care less about?
A bunch of nerds who fret and fester and postulate about their every move.
You mean, people who make and/or influence purchasing decisions? OK there, sport.
Re: (Score:2)
You're one of those guys who tells management they should buy servers with AMD processors in them?
Not until recently, when it came out that Intel either doesn't care about security, or is totally incapable when it comes to security. Either one is a complete show-stopper for anyone doing serious business.
Re: (Score:2)
They haven't released any details on how to execute the vulnerability.
How is this not responsible disclosure?
Perhaps AMD refused to sign an NDA?
They all have insane requirements (Score:5, Informative)
All of those "vulnerabilities" have insane requirements like being able to defeat OEM BIOS flash protections or Windows' driver signing...
MASTERKEY:
Exploiting MASTERKEY requires an attacker to be able to re-flash the BIOS with a specially crafted BIOS update. This update would contain Secure Processor metadata that exploits one of the vulnerabilities, as well as malware code compiled for ARM Cortex A5 – the processor inside the AMD Secure Processor.
RYZENFALL:
Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges. Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.
FALLOUT:
Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges. Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.
CHIMERA:
Prerequisites for Exploitation: A program running with local-machine elevated administrator privileges. Access to the device is provided by a driver that is digitally signed by the vendor.
Re:They all have insane requirements (Score:5, Funny)
You're missing the point.
The point is - they came up with really cool names for each exploit.
Re: (Score:2)
Wow this sounds like a no brainer, so if a thief already has the keys to your house then you might get some stuff stolen, or they might saw the lock off the door. It doesn't sound like a security problem to me at all. Someone with local machine administrator privileges pretty much already owns your machine.
Re: (Score:2)
+1
Re: (Score:2)
OMG so if you gain root access to the system, you can do anything with the hardware that the drivers allow? Or if you replace the software that the thing is running with your own software, it does stuff that you tell it to?
How is this an "exploit" exactly? Sounds like it's working as intended.
Re: (Score:2)
Accessing the Secure Processor is done through a vendor supplied driver that is digitally signed.
I think this implies that there is an existing AMD driver that allows the attack.
Re: (Score:2)
If the quoted AC is correct, then this item is not news.
. . . Exploiting MASTERKEY requires an attacker to be able to re-flash the BIOS with a specially crafted BIOS update.
. . . RYZENFALL Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges.
. . . FALLOUT Exploitation requires that an attacker be able to run a program with local-machine elevated administrator privileges.
. . . CHIMERA: Prerequisites for Exploitation: A program running with local-machine elevated administrator privileges. Access to the device is provided by a driver that is digitally signed by the vendor.
If physical access is required to exploit a 'security flaw', then it's not really much of an exploit; now, is it?
ANY OF THESE CATCHILY NAMED VULNERABILITIES require you to be p0wn3d by the exploiter before they can begin, as well.
If someone has physical control of your computer; you have far bigger problems than these pipsqueaks from 'whatever that hit-job company is named."
Re: (Score:3)
I just checked my system and discovered I have a BIOS and signed drivers! Have I been hacked already!?
If you are running a modern, UEFI-based system I would be concerned.
business angle (Score:2)
if the bounty programs were reliable and lucrative enough, then security researchers could justify revealing vulnerabilities on the company's terms, i.e., quietly and when ready
however, if a company's bounty programs were thought to be low-paying and unreliably given, then the new-found vulnerability could be used from a marketing perspective to give the researchers access to more business opportunities and money.... try to get publicity for it, it might pay off that way instead
They shortened AMD stocks (Score:3, Interesting)
From reddit.com: [reddit.com]
FRANKFURT, March 12 (Reuters) - German financial watchdog Bafin said on Monday that short-seller Viceroy Research breached German securities law with a research report on ProSiebenSat.1 as it did not notify the regulator of its activities.
Under German law, any entity that is not a securities firm, a fund manager, an EU administrative firm or an investment company that intends to publish recommendations on investments in assets must notify Bafin ahead of time, it said.
It also said Viceroy’s website did not contain information on where the company was based.
ProSieben last week rejected a critical report by Viceroy that led to a drop in its share price by as much as 9 percent, saying the allegations of questionable accounting contained in it were“unfounded and distorting reality”. (Reporting by Maria Sheahan Editing by Arno Schuetze)
Not a vulnerability (Score:5, Interesting)
*yes, I had this conversation.
Re: (Score:2)
FOR THE LAZY: (2^31 + 7) Bytes = 2 TB & change.
Re: (Score:2)
This is both an attack on AMD (and possibly their stock price) and a way for the researchers to get publicity.
I'll buy publicity, but an attack on AMD... no.
Saying it's an attack on AMD is about as sensible as saying the (many) flaws published about Intel's products were attacks on Intel.
If there's a flaw, it doesn't exist because of the researchers. If the researchers were truly malicious, they wouldn't have disclosed anything at all.
Zero-day exploits give engineering departments heartburn and sleepless nights, but do little to the stock price over the long term. The only way this hurts AMD is if AMD says it isn't
24 hours heads up? (Score:2, Interesting)
Such a quick turnaround between private and public disclosure means one of two things.
First possibility: They're not interested in responsible disclosure. Likely. As others have pointed out, they get more noise for their findings this way.
Second possibility: They know these vulnerabilities are being actively exploited. Not as likely, but a real possibility, and way more worrying.
Re: (Score:2)
Re: (Score:3)
Third: This is a stock-scam and they need the short turnaround time, otherwise AMD could have stated (after analysis) that this actually has no substance.
Re: (Score:3)
If it's a stock scam, it's an amazingly ignorant one. The average day trader doesn't know about or really care about AMD. Even Intel is yesterday's news. They just don't have Apple's name recognition.
If they were shorting AMD stock they would have only made 4.5% if they were prescient and both bought and sold their stock perfectly. If they weren't so lucky, they would have been seriously in the hole (down to -7%) and likely would have given up before 2PM EST.
Coupled with the (expected) blocking of the Qual
Re: (Score:2)
Look at their logo and the youtube video: Cheap background and cheap logo bought from the same site. The "vulnerabilities" are mostly irrelevant, if physical access is given, the attacker can do anything. Then the very short "disclosure" period that makes absolutely no sense, except as an ingredient in stock-fraud.
So yes, "amazingly ignorant" is pretty much right on the mark.
Apple (Score:2)
Well, here's hoping that Apple's new low-cost entry-level MacBook uses one of their own A12 or whatever. Lower price and better security, maybe?
Now this is suspicious (Score:5, Insightful)
Look at how the information is delivered. "This site is to inform the public about the vulnerabilities and call upon AMD and the security community to fix the vulnerable products." - but doesn't actually give AMD the time to fix the problem(s).
Look at the website: amdflaws.com
Nice name.
"MASTERKEY requires an attacker to be able to re-flash the BIOS with a specially crafted BIOS update"
So this is a low impact problem. Yes they try to hype it but the fact is if anyone have access to a computer one should always assume they can gain control.
For just a few years ago people wouldn't even try to portrait it as a problem.
The rest are similar things - bypassing security while still needing physical and/or elevated privileges. Yes there may be problems caused by this, no the problems aren't really bad.
I wouldn't be surprised if Intel spent some $$$ to encourage the group behind this to select the website name, the naming of the exploits (or "exploits" in some cases), how they are presented on the website and the white paper, and lastly to not giving AMD any chance to patch the problems. Add to this the quote above that show an exceptional level of dishonesty.
And if Intel didn't give them anything the group missed out - Intel have dedicated resources for these kind of operations as anyone that have been into computers for a while should know.
Disgusting.
From their own Disclaimer (Score:5, Interesting)
https://amdflaws.com/disclaime... [amdflaws.com]
"Although we have a good faith belief in our analysis and believe it to be objective and unbiased, you are advised that we may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports."
24 hours notice. "Researchers" who seem to spring up out of nowhere. Creating a website and videos for maximum publicity. All the security flaws seem overblown (require actual flashing of firmware or bypassing driver signing), and.. wait, what's this?
https://www.reddit.com/r/AMD_S... [reddit.com]
A huge number of put option (a bet that share price will fall dramatically) volume 5 days ago?
Nah, this is totally legit!
Re: (Score:2)
A huge number of put option (a bet that share price will fall dramatically) volume 5 days ago?
To play devil's advocate: Put options like that are an everyday occurrence. They're not unusual in any way.
There's even a solid reason for the bet: Much like Intel [slashdot.org], AMD missed the boat for mobile processors. Neither Intel nor AMD have processors in the iOS world, nor do they have a serious competitor to Qualcomm's SnapDragon or NVIDIA's Tegra on Android. Most of the arguments that the Broadcom+Qualcomm merger being an "existential threat" to Intel also applies to AMD, because they both missed the fastest-
Re: (Score:2)
I am especially unreliable! Kava! Kava! Booyah! Picard Maneuver! Han Shot First!
However, I can't imagine what your comment has to do with this story.
Re: (Score:2)
Get back under the bed, you... !
I agree though - this isn't an OSS=bad issue at all. Dick move by the researchers aside, this is still a net benefit (many eyes still making bugs shallow, etc.)
Overall, I'd rather find out (even under crap circumstances like this) in public, then to have script kiddies exploiting it like crazy in private.
Re: (Score:2)
Agreed; six months ago when Intel's competitor (Intel Management Engine) was withering in the spotlight, I was disappointed to see that AMD had their "Secure Processor" that did the same thing.
In a past job, I wrote software that was used to manage large numbers of systems using remote management (such as IME or AMD's SP). They are all comically buggy, regardless of vendor. Where there are bugs, there are exploits, and I'm not at all surprised to see the two biggest implementations fell within six months of
in a vm need to get to the base os to flash (Score:2)
in a vm need to get to the base os to flash unless some how that hardware was mapped to the VM
Re: (Score:2)
Sounds like people are more butthurt over that then addressing their actual claims which are more damning
We saw the same thing happen when Spectre was announced - a lot of butthurt AC's were adamant that the only "real" problem was the Intel-only meltdown bug, and anyone who disagreed were "shills" for Intel; that Spectre was invented to smear AMD.
It seems there is a growing percentage of the population who instantly fall back on conspiracy theories whenever reality reveals something they don't like.
The proper reaction to a bug to curse, fix it, and move on.
Re: (Score:2)