Researcher to Showcase Remote Code Execution On Intel CPUs
A researcher will demonstrate the exploitable bugs of Intel's CPUs by attacking both locally and remotely, regardless of the patches applied or operating system.
Researcher and technical writer Kris Kaspersky will actually showcase
how such an attack can be made in a presentation at the upcoming Hack In The Box (HITB) Security Conference in Kuala Lumpur, Malaysia, 27th -30th October.
According to the Intel Specification Updates, Intel Core 2 has 128 confirmed bugs. Intel Itanium (designed for critical systems) is carrying over 230 bugs. They have all been confirmed by Intel and described in errata section of their specification updates. Some bugs "just" crash the system (under quite rare conditions) while the others give the attackers full control over the machine. "In other words, Intel CPUs have exploitable bugs which are vulnerable to both local and remote attacks which works against any OS regardless of the patches applied or the applications which are running," Kaspersky says.
Although CPU bugs are not something new in the security industry, nobody has come out with any proof-of-concept exploits and as it stands, there are no known malware that take advantage of these bugs, although some malware writers have actually used CPU bugs for targeted attacks.
"It is just a matter of time before we start seeing these sort of attacks used in more devastating ways over the Internet. Intel has provided workarounds to major BIOS vendors for some of these bugs, but who knows which vendor actually uses them " End-users are in the dark as to how to check if they are secure or not. Intel doesn't provide any test program for this and the worst thing is - some bugs are still not fixed. In other words, Intel has no workaround for it."
In this presentation, Kaspersky will share with the participants the finding of his CPU malware detection research which was funded by Endeavor Security. He will also present to the participants his improved POC code and will show participants how it's possible to make an attack via JavaScript code or just TCP/IP packets storms against Intel based machine. Some of the bugs that will be shown are exploitable via common instruction sequences and by knowing the mechanics behind certain JIT Java-compilers, attackers can force the compiler to do what they want (for example: short nested loops lead to system crashes on many CPUs). He also said that we would share with the participants his experience in data recovery and how CPU bugs have actually contributed in damaging our hard drives without our knowledge.
According to the Intel Specification Updates, Intel Core 2 has 128 confirmed bugs. Intel Itanium (designed for critical systems) is carrying over 230 bugs. They have all been confirmed by Intel and described in errata section of their specification updates. Some bugs "just" crash the system (under quite rare conditions) while the others give the attackers full control over the machine. "In other words, Intel CPUs have exploitable bugs which are vulnerable to both local and remote attacks which works against any OS regardless of the patches applied or the applications which are running," Kaspersky says.
Although CPU bugs are not something new in the security industry, nobody has come out with any proof-of-concept exploits and as it stands, there are no known malware that take advantage of these bugs, although some malware writers have actually used CPU bugs for targeted attacks.
"It is just a matter of time before we start seeing these sort of attacks used in more devastating ways over the Internet. Intel has provided workarounds to major BIOS vendors for some of these bugs, but who knows which vendor actually uses them " End-users are in the dark as to how to check if they are secure or not. Intel doesn't provide any test program for this and the worst thing is - some bugs are still not fixed. In other words, Intel has no workaround for it."
In this presentation, Kaspersky will share with the participants the finding of his CPU malware detection research which was funded by Endeavor Security. He will also present to the participants his improved POC code and will show participants how it's possible to make an attack via JavaScript code or just TCP/IP packets storms against Intel based machine. Some of the bugs that will be shown are exploitable via common instruction sequences and by knowing the mechanics behind certain JIT Java-compilers, attackers can force the compiler to do what they want (for example: short nested loops lead to system crashes on many CPUs). He also said that we would share with the participants his experience in data recovery and how CPU bugs have actually contributed in damaging our hard drives without our knowledge.