Intel processor memory vulnerabilities can be exploited to attack all systems

Source: Internet
Author: User
Intel processor memory vulnerabilities can be exploited to attack all systems-general Linux technology-Linux technology and application information. The following is a detailed description. On August 18, July 15, according to foreign media reports, security researcher Kris Kaspersky recently said he would show how to exploit intel processor vulnerabilities to remotely attack users' computers, regardless of the operating system you have installed.

Kriss said he planned to show the attack method at the "Hack in the Box" Security Conference in Kuala Lumpur, Malaysia on October this year. Kriss will use JavaScript or TCP/IP packets to launch attacks, proving that the processor Vulnerability (Errata) can be used by hackers to launch attacks.

Kriss also said that processor vulnerabilities are becoming more and more threatening. In the future, virus authors will also exploit such vulnerabilities to develop malware. Chris says different processor vulnerabilities allow hackers to do different things. Some vulnerabilities only crash the system, some allow hackers to fully control the system, and some can help hackers disable Vista security protection.

Kriss will show attacks against almost all operating system-based PCs, including Windows XP, Vista, Windows Server 2003, Windows Server 2008, Linux, and BSD. All these systems have been fully patched. Chris also added that it may also be able to show attacks on Mac computers.

The processor usually contains hundreds of millions of transistors, so it is normal to have an error table. Some vulnerabilities may affect the processor performance, but some users cannot detect them. For example, according to Intel's data released on April 9, June, there are 35 error tables for the Silverthorne Atom processor.

"Fixing most of these vulnerabilities is possible, and Intel also provides solutions to major BIOS vendors," said Chris. However, not every vendor can deploy the service. Therefore, vulnerabilities are inevitable ."
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.