Some of the Windows updates released by Microsoft to mitigate the Meltdown 
vulnerability introduce an even more severe security hole, a researcher has 
warned.

Microsoft has released patches 
<https://www.securityweek.com/microsoft-releases-more-patches-meltdown-spectre> 
for the Meltdown and Spectre vulnerabilities every month since their disclosure 
in January. While at this point the updates should prevent these attacks, a 
researcher claims some of the fixes create a bigger problem.

According to Ulf Frisk, the updates released by Microsoft in January and 
February for Windows 7 and Windows Server 2008 R2 patch Meltdown, but they 
allow an attacker to easily read from and write to memory.

He noted that while Meltdown allows an attacker to read megabytes of data per 
second, the new vulnerability can be exploited to read gigabytes of data per 
second – in one of the tests he conducted, the expert managed to access the 
memory at speeds of over 4 Gbps. Moreover, the flaw also makes it possible to 
write to memory.

Frisk says exploitation does not require any sophisticated exploits – standard 
read and write instructions will get the job done – as Windows 7 has already 
mapped the memory for each active process.

“In short - the User/Supervisor permission bit was set to User in the PML4 
self-referencing entry. This made the page tables available to user mode code 
in every process. The page tables should normally only be accessible by the 
kernel itself,” the researcher explained 
<https://blog.frizk.net/2018/03/total-meltdown.html>. “The PML4 is the base of 
the 4-level in-memory page table hierarchy that the CPU Memory Management Unit 
(MMU) uses to translate the virtual addresses of a process into physical memory 
addresses in RAM.”

“Once read/write access has been gained to the page tables it will be trivially 
easy to gain access to the complete physical memory, unless it is additionally 
protected by Extended Page Tables (EPTs) used for Virtualization. All one have 
to do is to write their own Page Table Entries (PTEs) into the page tables to 
access arbitrary physical memory,” he said.

The researcher says anyone can reproduce the vulnerability using a direct 
memory access (DMA) attack tool <https://github.com/ufrisk/pcileech> he 
developed a few years ago. The attack works against devices running Windows 7 
x64 or Windows Server 2008 R2 with the Microsoft patches from January or 
February installed. The issue did not exist before January and it appears to 
have been addressed by Microsoft with the March updates. Windows 10 and Windows 
8.1 are not affected, Frisk said.

A Microsoft spokesperson told SecurityWeek that the company is aware of the 
report and is looking into it.

Frisk previously discovered a macOS vulnerability 
<https://www.securityweek.com/macbooks-leak-disk-encryption-password> that 
could have been exploited to obtain FileVault passwords, and demonstrated some 
UEFI attacks <https://blog.frizk.net/2017/08/attacking-uefi.html>.

*Updated with statement from Microsoft
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to