HomeSample Page

Sample Page Title


New SLAM attack steals sensitive data from AMD, future Intel CPUs

Educational researchers developed a brand new side-channel assault known as SLAM that exploits {hardware} options designed to enhance safety in upcoming CPUs from Intel, AMD, and Arm to acquire the foundation password hash from the kernel reminiscence.

SLAM is a transient execution assault that takes benefit of a reminiscence characteristic that permits software program to make use of untranslated deal with bits in 64-bit linear addresses for storing metadata.

CPU distributors implement this in several methods and have distinct phrases for it. Intel calls it Linear Handle Masking (LAM), AMD names it Higher Handle Ignore (UAI), and Arm refers back to the characteristic as High Byte Ignore (TBI).

Brief for Spectre based mostly on LAM, the SLAM assault was found by researchers at Methods and Community Safety Group (VUSec Group) at Vrije Universiteit Amsterdam, who demonstrated its validity by emulating the upcoming LAM characteristic from Intel on a last-generation Ubuntu system.

In keeping with VUSec, SLAM impacts primarily future chips that meet particular standards. The explanations for this embody the dearth of robust canonicality checks in future chip designs.

Moreover, whereas the superior {hardware} options (e.g. LAM, UAI, and TBI) enhance reminiscence safety and administration, in addition they introduce exploitable micro-architectural race circumstances.

Leaking the foundation password hash

The assault leverages a brand new transient execution method that focuses on exploiting a beforehand unexplored class of Spectre disclosure devices, particularly these involving pointer chasing.

Devices are directions in software program code that the attacker can manipulate to set off speculative execution in a method that reveals delicate info.

Though the outcomes of speculative execution are discarded, the method leaves traces like altered cache states which attackers can observe to deduce delicate info akin to knowledge from different applications and even the working system.

The SLAM assault targets “unmasked” devices that use secret knowledge as a pointer, which the researchers report are frequent in software program and will be exploited to leak arbitrary ASCII kernel knowledge.

The researchers developed a scanner with which they discovered a whole lot of exploitable devices on the Linux kernel. The next video demonstrates the assault that leaks the foundation password hash from the kernel.

In sensible state of affairs, an attacker would want to execute on the goal system code that interacts with the unmasked devices after which rigorously measure the unintended effects utilizing refined algorithms to extract delicate info akin to passwords or encryption keys from the kernel reminiscence.

The code and knowledge for reproducing the SLAM assault can be found on VUSec’s GitHub repository. The researchers additionally revealed a technical paper explaining how the assault works.

VUSec notes that SLAM impacts the next processors: 

  • Current AMD CPUs weak to CVE-2020-12965
  • Future Intel CPUs supporting LAM (each 4- and 5-level paging)
  • Future AMD CPUs supporting UAI and 5-level paging
  • Future Arm CPUs supporting TBI and 5-level paging

Vendor response to SLAM

Responding to the researchers’ disclosure, Arm revealed an advisory explaining that its methods already mitigate in opposition to Spectre v2 and Spectre-BHB and plan no additional motion in response to SLAM.

AMD additionally pointed to present Spectre v2 mitigations to deal with the SLAM assault described by the VUSec analysis group and didn’t present any steering or updates that might decrease the danger.

Intel introduced plans for offering software program steering earlier than releasing future processors that help LAM, akin to deploying the characteristic with the Linear Handle Area Separation (LASS) safety extention for stopping speculative deal with accesses throughout consumer/kernel mode.

Till additional steering turns into accessible, Linux engineers have created patches that disable LAM.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles