本篇文章給大家分享的是有關(guān)怎么解析CPU SSB/RSRE漏洞預(yù)警,小編覺得挺實(shí)用的,因此分享給大家學(xué)習(xí),希望大家閱讀完這篇文章后可以有所收獲,話不多說(shuō),跟著小編一起來(lái)看看吧。
創(chuàng)新互聯(lián)專注于乳源企業(yè)網(wǎng)站建設(shè),響應(yīng)式網(wǎng)站,成都做商城網(wǎng)站。乳源網(wǎng)站建設(shè)公司,為乳源等地區(qū)提供建站服務(wù)。全流程按需設(shè)計(jì),專業(yè)設(shè)計(jì),全程項(xiàng)目跟蹤,創(chuàng)新互聯(lián)專業(yè)和態(tài)度為您提供的服務(wù)
2018年5月21日,微軟官方公布新CPU漏洞--Speculative Store Bypass (SSB)漏洞細(xì)節(jié),屬于日前預(yù)警的Spectre-NG的其中一個(gè)( Variant 4),由MSRC團(tuán)隊(duì)的Ken Johnson和Google Project Zero團(tuán)隊(duì)的Jann Horn共同發(fā)現(xiàn),漏洞編號(hào)為CVE-2018-3639,目前Google Project Zero團(tuán)隊(duì)已公布相關(guān)poc代碼,攻擊者能通過v4拿到cpu或內(nèi)存中的舊有內(nèi)容。
同時(shí),另一個(gè)CPU漏洞--Rogue System Register Read (RSRE)也被披露,屬于Spectre-NG中的Variant 3a,漏洞編號(hào)為CVE-2018-3640。
360-CERT團(tuán)隊(duì)經(jīng)過評(píng)估,認(rèn)為漏洞風(fēng)險(xiǎn)等級(jí)重要,建議進(jìn)行謹(jǐn)慎評(píng)估后更新。
AMD,ARM,Intel廠商的CPU分別受到不同程度的影響
目前,
微軟在年初發(fā)布的針對(duì)Spectre and Meltdown漏洞的安全更新對(duì)此漏洞有一定的緩解。
主流瀏覽器廠商,Intel, RedHat, Xen等各家基礎(chǔ)服務(wù)提供商也提供了相應(yīng)的緩解措施。
Intel提供的受影響處理器列表:
Intel? Core? i3 processor (45nm and 32nm)
Intel? Core? i5 processor (45nm and 32nm)
Intel? Core? i7 processor (45nm and 32nm)
Intel? Core? M processor family (45nm and 32nm)
2nd generation Intel? Core? processors
3rd generation Intel? Core? processors
4th generation Intel? Core? processors
5th generation Intel? Core? processors
6th generation Intel? Core? processors
7th generation Intel? Core? processors
8th generation Intel? Core? processors
Intel? Core? X-series Processor Family for Intel? X99 platforms
Intel? Core? X-series Processor Family for Intel? X299 platforms
Intel? Xeon? processor 3400 series
Intel? Xeon? processor 3600 series
Intel? Xeon? processor 5500 series
Intel? Xeon? processor 5600 series
Intel? Xeon? processor 6500 series
Intel? Xeon? processor 7500 series
Intel? Xeon? Processor E3 Family
Intel? Xeon? Processor E3 v2 Family
Intel? Xeon? Processor E3 v3 Family
Intel? Xeon? Processor E3 v4 Family
Intel? Xeon? Processor E3 v5 Family
Intel? Xeon? Processor E3 v6 Family
Intel? Xeon? Processor E5 Family
Intel? Xeon? Processor E5 v2 Family
Intel? Xeon? Processor E5 v3 Family
Intel? Xeon? Processor E5 v4 Family
Intel? Xeon? Processor E7 Family
Intel? Xeon? Processor E7 v2 Family
Intel? Xeon? Processor E7 v3 Family
Intel? Xeon? Processor E7 v4 Family
Intel? Xeon? Processor Scalable Family
Intel? Atom? Processor C Series (C3308, C3338, C3508, C3538, C3558, C3708, C3750, C3758, C3808, C3830, C3850, C3858, C3950, C3955, C3958)
Intel? Atom? Processor E Series
Intel? Atom? Processor A Series
Intel? Atom? Processor X Series (x5-E3930, x5-E3940, x7-E3950)
Intel? Atom? Processor T Series (T5500, T5700)
Intel? Atom? Processor Z Series
Intel? Celeron? Processor J Series (J3355, J3455, J4005, J4105)
Intel? Celeron? Processor N Series (N3450)
Intel? Pentium? Processor J Series (J4205)
Intel? Pentium? Processor N Series (N4000, N4100, N4200)
Intel? Pentium? Processor Silver Series (J5005, N5000)
Speculative Store Bypass (SSB)--CVE-2018-3639漏洞細(xì)節(jié),攻擊者能通過v4拿到cpu或內(nèi)存中的舊有內(nèi)容,漏洞可能發(fā)生在如下場(chǎng)景:
01: 88040F mov [rdi+rcx],al
02: 4C0FB6040E movzx r8,byte [rsi+rcx]
03: 49C1E00C shl r8,byte 0xc
04: 428B0402 mov eax,[rdx+r8]
如果RDI和RSI指向的是同一個(gè)地址,則假設(shè)第1行中的MOV指令在特殊情況下可能需要額外的時(shí)間來(lái)執(zhí)行( 如果計(jì)算RDI+RCX的地址表達(dá)式正在等待先前的指令執(zhí)行)。在這種情況下,CPU可能會(huì)預(yù)測(cè)MOVZX不依賴于MOV,并且可以在執(zhí)行保存AL數(shù)據(jù)的MOV之前進(jìn)行預(yù)測(cè)執(zhí)行。這可能會(huì)導(dǎo)致位于RSI+RCX的內(nèi)存中的舊數(shù)據(jù)被加載到R8中,從而導(dǎo)致第四行代碼使用了錯(cuò)誤的數(shù)據(jù)。
該漏洞適用的攻擊場(chǎng)景如下:
Poc的運(yùn)行效果如下:
Rogue System Register Read (RSRE)--CVE-2018-3640漏洞:
該漏洞允許具有本地用戶訪問權(quán)限的攻擊者在有預(yù)測(cè)執(zhí)行能力的微處理器上,可以通過側(cè)信道攻擊讀取系統(tǒng)寄存器的值
針對(duì)Speculative Store Bypass (SSB)--CVE-2018-3639的緩解措施:
利用序列化指令(例如x86/x64上的LFENCE 和 ARM上的SSBB指令)來(lái)屏蔽預(yù)測(cè)執(zhí)行,緩解SSB漏洞
升級(jí)微碼或固件在硬件方面修補(bǔ)該漏洞
對(duì)于CVE-2017-5753 (Spectre variant 1)漏洞的緩解措施同樣適用于該漏洞
其他緩解措施對(duì)該漏洞的影響:
以上就是怎么解析CPU SSB/RSRE漏洞預(yù)警,小編相信有部分知識(shí)點(diǎn)可能是我們?nèi)粘9ぷ鲿?huì)見到或用到的。希望你能通過這篇文章學(xué)到更多知識(shí)。更多詳情敬請(qǐng)關(guān)注創(chuàng)新互聯(lián)行業(yè)資訊頻道。