Page 5 of 7 FirstFirst ... 234567 LastLast
Results 65 to 80 of 101

Thread: AMD processors impacted by 13 serious flaws, says CTS Labs

  1. #65
    Administrator MLyons's Avatar
    Join Date
    Feb 2017
    Posts
    474
    Thanks
    310
    Thanked
    156 times in 92 posts
    • MLyons's system
      • Motherboard:
      • ASUS PRIME X470-PRO
      • CPU:
      • 2700x
      • Memory:
      • 16GB DDR4 Corsair RGB
      • Storage:
      • 500GB MX500 500GB HDD 2TB SSD
      • Graphics card(s):
      • EVGA SC2 1080Ti
      • PSU:
      • Corsair tx650
      • Case:
      • Corsair Air 540
      • Operating System:
      • Windows 10
      • Monitor(s):
      • 2 Asus 1080p

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by rainman View Post
    ... and I'd go as far as suggesting that in you doing so amounts to a libel, against myself. So perhaps you'd like to just review your accusations before this escalates somewhere to the benefit of neither of us?

    Quote Originally Posted by rainman View Post
    Are you moderating me or is this just your personal opinion? Maybe you want to do this in a PM? I don't see that I'm the one that needs to moderate anything but right now I'm wondering "who moderates the moderator"?
    Me and the other staff. In this case, he's fine.
    Half dev, Half doge. Some say DevDoge

    Feel free to message me if you find any bugs or have any suggestions.
    If you need me urgently, PM me
    If something is/was broke it was probably me. ¯\_(ツ)_/¯

  2. Received thanks from:

    CAT-THE-FIFTH (14-03-2018),chinf (15-03-2018),peterb (14-03-2018),Pleiades (15-03-2018),Tabbykatze (14-03-2018),Zak33 (14-03-2018)

  3. #66
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    CTS-Labs response to all of this:

    http://www.tomshardware.com/news/cts...pyc,36660.html

    CTS Labs Speaks: Why It Blindsided AMD With Ryzenfall And Other Vulnerabilities
    by Nathaniel Mott March 14, 2018 at 8:45 AM

    Researchers often reveal new vulnerabilities with flashy websites, clever branding, and a concerted effort to make sure the problems are covered by media outlets (like this one). The newly announced flaws in AMD's Ryzen and EPYC processors are no exception to this rule--in fact, their revelation was even more focused on garnering attention from the public than many other disclosures. It was just missing one thing: time for AMD to respond.
    90 Days Vs. 1 Day

    We spoke with CTS Labs, the Israel-based company that says it discovered flaws in AMD's Ryzen and EPYC processors to ask why it conducted its disclosure in such a dramatically unorthodox--and many would say unfair--manner.

    When researchers discover vulnerabilities in products, they typically give companies 90 days to respond before disclosing their findings to the public. Some flaws are deemed so dangerous that companies are given even longer to respond--Google afforded Intel and AMD some 200 days to fix Meltdown and Spectre before revealing them to the world at large, for example, and other disclosures have been coordinated between victim and researcher.

    But CTS Labs offered AMD no such courtesy. It told AMD about the vulnerabilities just 24 hours before they were revealed to the public. That's clearly not long enough for AMD to address the issues, or even possibly for it to notice CTS Labs' message, considering how many bug reports the company receives on a daily basis.

    CTS Labs told us that it bucked the industry-standard 90-day response time because, after it discussed the vulnerabilities with manufacturers and other security experts, it came to believe that AMD wouldn't be able to fix the problems for "many, many months, or even a year." Instead of waiting a full year to reveal these vulnerabilities, CTS Labs decided to inform the public of its discovery.

    That isn't to say that CTS Labs revealed the problems without checking their veracity. The company told us that it consulted with other security experts and manufacturers about the issue, provided them with proofs of concept and tutorials for exploiting the vulnerabilities, and waited for their responses before preparing the flaws for public disclosure. Trail of Bits CEO Dan Guido confirmed that his company backed up the findings, for example.
    To What End And For What Purpose?

    Yet it's important to note that the circumstances surrounding the vulnerabilities' disclosure, and the fact that this is a new company, have raised questions about CTS Labs' intentions. It feels like a hit job on AMD, aimed at torpedoing its stock price. That may be unfair to CTS Labs, but optics and decorum are important to perception, and perception is reality for many.

    Yaron Luk-Zilberman and Ido Li On, the company's CFO and CEO, respectively, told us they founded CTS Labs in January 2017 to investigate the security of hardware products. These vulnerabilities are their first major discovery.

    The disclosure process itself also raised questions. Though we were told AMD, Trail of Bits, and others were given proofs of concept and instructions for how to exploit the vulnerabilities, that information was not released to the general public. Luk-Zilberman and Li On said that was because the flaws are "practical" and "fit well in the different scenarios and stages of a cyber attack." In other words, they don't want to enable those attacks by revealing too much. That, of course, creates a catch-22 of credibility, because with the details under wraps, most of us in the media (not to mention the curious public) can't examine and evaluate the findings and allegations for ourselves. And because CTS Labs is a new company with no track record to speak of, we can't simply give them the benefit of the doubt.

    None of that stopped CTS Labs from putting together a dedicated website for the vulnerabilities, shooting videos explaining them, or briefing (a few) members of the media before discussing the flaws with AMD. In fact, Luk-Zilberman and Li On told us that they have yet to hear from AMD despite all the attention their disclosure has garnered from enthusiasts and journalists. (We asked AMD if this is true; we'll update if the company responds to that question.)

    CTS Labs' CTO, Ilia Luk-Zilberman, has now posted a letter on the AMDflaws site that says much of what he told us. It's a somewhat curious screed in which he expounds on his distaste for the 90-day response window and his views on why it's not helpful. Partly, he said that he thinks alerting everyone at once (that is, consumers, media, and companies) puts public pressure on the companies to fix the vulnerabilities (it certainly does), and that by doing so without disclosing the actual technical details, no one is actually at risk. But that creates obvious problems, such as causing widespread FUD, and it invites backlash upon the security researchers, all of which he alluded to in the letter. The salient passage reads in part:

    This model has a huge problem; how can you convince the public you are telling the truth without the technical details. And we have been paying that price of disbelief in the past 24h. The solution we came up with is a third party validation, like the one we did with Dan from trailofbits. In retrospect, we would have done this with 5 third party validators to remove any doubts. A lesson for next time.

    Altogether, it seems that AMD customers may be justified in worrying about these vulnerabilities. If CTS Labs' description of them is accurate, they are remotely exploitable flaws that could allow attackers to install persistent malware in the deepest recesses of a system. That puts consumers at risk, and it could also undermine businesses' secure networks simply because they rely on Ryzen or EPYC processors.

    But that brings us back to the curious fact that AMD had little time to respond to these allegations. Even if you take CTS Labs' stated reasoning for ignoring the industry standard 90-day windows at face value, it doesn't seem to make much sense. Because CTS Labs won't release more detailed information about the vulnerabilities to the public--a wise choice, technically, if they are indeed actually easy to exploit--we won't have concrete confirmation of their existence until AMD has had a chance to examine the problem. If CTS Labs did provide all the research it has to AMD, that shouldn't take long. We expect to learn more about the issue over the coming days--and to witness its potential aftermath over the coming weeks, months, and years.

  4. #67
    HEXUS.timelord. Zak33's Avatar
    Join Date
    Jul 2003
    Location
    I'm a Jessie
    Posts
    35,185
    Thanks
    3,126
    Thanked
    3,179 times in 1,926 posts
    • Zak33's system
      • Storage:
      • Kingston HyperX SSD, Hitachi 1Tb
      • Graphics card(s):
      • Nvidia 1050
      • PSU:
      • Coolermaster 800w
      • Case:
      • Silverstone Fortress FT01
      • Operating System:
      • Win10
      • Internet:
      • Zen FTC uber speedy

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by MLyons View Post


    Me and the other staff. In this case, he's fine.

    /\ that.. with big non AMD and NON Intel biased bells on it.

    Peterb is well within the right side of right. He volunteers to do this work, and to try to mediate between you lot. He gets no dough, no favours and no reward. But he's pretty bloody good at it.

    CAT and I disagree a fair bit on stuff. And I think he's a tad biased on the odd occassion.... but we rub along and often he makes me laugh hard too .

    I expect EVERYONE to rub along

    thanks

    Quote Originally Posted by Advice Trinity by Knoxville
    "The second you aren't paying attention to the tool you're using, it will take your fingers from you. It does not know sympathy." |
    "If you don't gaffer it, it will gaffer you" | "Belt and braces"

  5. Received thanks from:

    CAT-THE-FIFTH (14-03-2018),peterb (14-03-2018),satrow (14-03-2018),Tabbykatze (14-03-2018)

  6. #68
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by rainman View Post
    However I've decided to colloquially address a particular subset of users on these forums, you are most definitely NOT justified in implying that I have made comments or consciously declined to comment on subjects and threads where I have most definitely not partaken at all, and I'd go as far as suggesting that in you doing so amounts to a libel, against myself. So perhaps you'd like to just review your accusations before this escalates somewhere to the benefit of neither of us?



    I've never posted anything to suggest that this is not the case.



    Are you moderating me or is this just your personal opinion? Maybe you want to do this in a PM? I don't see that I'm the one that needs to moderate anything but right now I'm wondering "who moderates the moderator"?
    How you've decided to "colloquially" address other members is relevant. We have rules on insulting other members, and that kind of put-down crosses it. That decision, by the way, is the sole perogative of the mod team, under our instructions from the site owner.

    Our remit is to encourage POLITE discussion, and loaded terms just put peoples backs up and encourage flame wars.

    As for "escalating" this, good luck with that. But if such implied threats continue, I can assure you now that I will unilaterally escalate an immediate account suspension, in order to mitigate any further 'risk'.

    And for what it matters, on the subject of the actual thread, my inclination is to your point of view, though both sides have some good points.

    I don't care which side is right, but it WILL be discussed in a polite manner without name-calling, and that applies to all parties.


    How hard can it be, everyone, to have a rational adult discussion, politely disagree without calling people shills, or accusing them of bias?

    Mind you, judging by the House of Commons, maybe it's not that easy. Come on, surely we can do better than politicians?

  7. Received thanks from:

    CAT-THE-FIFTH (14-03-2018),chinf (15-03-2018),Iota (14-03-2018),peterb (14-03-2018),Pleiades (15-03-2018),satrow (14-03-2018)

  8. #69
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    My major concern with this,is generally when it comes to potential issues being highlighted,is companies are given a minimum period to do look at it - the response by CTS-Labs to TH,is them in a reality distortion sphere. The whole aspect of why they informed the media first,apparently have links with investment firms and companies which might profit from this,paid other researchers to kind of do their dirty work for them essentially,etc is not really on. Even the whole point,they tried to bury the fact they made mining malware for a living,etc.

    I might understand if AMD sat on this for six months and did eff all - but under 24 hours?? What does telling the press beforehand,actually help in terms of security unless you want to try and manipulate stock,or have some weird issue with a company??

    It also makes anyone question why they were only started looking at the security of AMD CPUs in 2017(apparently they had earlier companies before that which didn't do that it appears) - so it would be intriguing why they chose AMD Ryzen,but not apparently Intel CPUs which there are 10X more off. Speculation on my part is whether someone had shopped around a nugget of info(its not like any of these companies even AMD have not done that before).

    This is the point some people need to understand - in scientific research you have to be 100% transparent - if not you will be ripped apart by the community and it has happened. This is to prevent research being published with potentially vested interests. The whole system is geared towards that to a degree and TBH its still a fight(especially when politicians get involved). If not science would fall apart. Nobody cares if your methods look nice,if the starting point is less than stellar. If not this thread would invoke Godwins Law pretty quickly!

    If this is allowed to stand,even if you have a love for Intel/Nvidia,etc - what if this sets a precedent for other cowboys to start doing the same for them for loads of tech companies?? Instead of doing what security researchers are meant to do,which is find flaws,inform companies of said flaws,and only then talk about it,once the companies can at least have some time to act(or not act on it).

    Like I said companies do pay people for doing this and do employ them too. These people seem more interested in causing a blind panic. Thats not to say there isn't a potential set of issues,but funny how Intel got six months grace period for an issue that has existed for 20 years apparently.

    At some point,what happens when one oversteps the mark,to outdo another cowboy competitor,and it leaks a big issue that no one has any time to try and do anything about?? Will we all be saying "cool" then??

    Instead they just make clickbait names,articles and flashy websites,which seem more like easy consumption for the general public and non-technical investors,and the general echo chamber.
    Last edited by CAT-THE-FIFTH; 14-03-2018 at 06:44 PM.

  9. #70
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by CAT-THE-FIFTH View Post
    I'm not buying the claim that saying there's an exploit without providing technical details does puts public pressure on the companies to fix the vulnerabilities, if no one knows how it's done it may as well not exist.

  10. #71
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by Corky34 View Post
    I'm not buying the claim that saying there's an exploit without providing technical details does puts public pressure on the companies to fix the vulnerabilities, if no one knows how it's done it may as well not exist.
    Apparently they have found a way around that - next time find 5 people to "verify" what they said(who no doubt they will pay to "verify" it) and then they can make a big song and dance about it,with some nice graphics and a marketing company which uses "social media influencers" and finding the "right reporters, bloggers, analysts and influencers who will understand your business". Screw consequences,as long as you have your 5 minutes of fame,its all cushty.,right?? So basically computer security for a social media generation. Rollo would be proud.

    Maybe I need to tell my mates who are in science they have a better chance of getting grants if they hire a marketing company to "social media influence" their next paper!
    Last edited by CAT-THE-FIFTH; 14-03-2018 at 05:56 PM.

  11. #72
    Admin (Ret'd)
    Join Date
    Jul 2003
    Posts
    18,481
    Thanks
    1,016
    Thanked
    3,208 times in 2,281 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    The above post by ohmaheid has bern deleted.

    What part of POLITE discussion, without slinging accusations about, don't you get?

    If I have to delete further posts, having already warned of this, twice now, the poster responsible will be getting a 7 day posting holiday to think about it.


    I mean it, everybody.

  12. #73
    Senior Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    1,331
    Thanks
    609
    Thanked
    103 times in 90 posts
    • Iota's system
      • Motherboard:
      • Asus Maximus Hero XI
      • CPU:
      • Intel Core i9 9900KF
      • Memory:
      • CMD32GX4M2C3200C16
      • Storage:
      • 1 x 1TB / 3 x 2TB Samsung 970 Evo Plus NVMe
      • Graphics card(s):
      • Nvidia RTX 3090 Founders Edition
      • PSU:
      • Corsair HX1200i
      • Case:
      • Corsair Obsidian 500D
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • Samsung Odyssey G9
      • Internet:
      • 500Mbps BT FTTH

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by Corky34 View Post
    I'm not buying the claim that saying there's an exploit without providing technical details does puts public pressure on the companies to fix the vulnerabilities, if no one knows how it's done it may as well not exist.
    On the face of it, had they ditched the "flashy website" (who else does this even?) and didn't actually have a vested interest in the stocks of AMD as per their disclaimer, as well as followed the responsible disclosure process which is effectively the industry normality, they may have had a different response from the community.

    CTS Labs told us that it bucked the industry-standard 90-day response time because, after it discussed the vulnerabilities with manufacturers and other security experts, it came to believe that AMD wouldn't be able to fix the problems for "many, many months, or even a year." Instead of waiting a full year to reveal these vulnerabilities, CTS Labs decided to inform the public of its discovery.
    CTS labs offers no proof they have consulted with manufacturers, they certainly haven't "consulted" with other "security experts", simply paid them to follow a process to confirm or deny it works. There have been no CVE numbers relating to these vulnerabilities disclosed, such as Google Project Zero would provide (without the flashy website). Also CTS labs has decided that allowing the basic 90 day responsible disclosure has no merits according to them.

    They haven't been transparent, there certainly don't seem to be objective based in their approach and I because of this I find myself less concerned about any potential vulnerabilities and much more concerned about the validity of their research, as well as the motivations behind that.

    Certainly not a good start for a company, first impressions count.

  13. #74
    Senior Member
    Join Date
    Jul 2009
    Location
    West Sussex
    Posts
    1,722
    Thanks
    199
    Thanked
    243 times in 223 posts
    • kompukare's system
      • Motherboard:
      • Asus P8Z77-V LX
      • CPU:
      • Intel i5-3570K
      • Memory:
      • 4 x 8GB DDR3
      • Storage:
      • Samsung 850 EVo 500GB | Corsair MP510 960GB | 2 x WD 4TB spinners
      • Graphics card(s):
      • Sappihre R7 260X 1GB (sic)
      • PSU:
      • Antec 650 Gold TruePower (Seasonic)
      • Case:
      • Aerocool DS 200 (silenced, 53.6 litres)l)
      • Operating System:
      • Windows 10-64
      • Monitor(s):
      • 2 x ViewSonic 27" 1440p

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    This outfit's modus operandi seems far more like a malware writer rather than a security researcher.
    That is, when a 'normal' exploit is found by malware 'researchers' they try and find a way to monetise it either by writing an exploit or selling it to some bigger criminal gangs etc.

    Since these flaws appear to be in the security processor and in AMD's equiv. to the Intel Management Engine (which has plenty of flaws itself), they were unlikely to be readably monetizable, so what was a malware 'researcher' like CTS Labs to do?

    Maybe get together with a company specialising in share short selling and then release their 'findings' in the most sensational way possible?

    Or at least that is one possible explantation.

  14. Received thanks from:

    MLyons (14-03-2018)

  15. #75
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by kompukare View Post
    This outfit's modus operandi seems far more like a malware writer rather than a security researcher.
    That is, when a 'normal' exploit is found by malware 'researchers' they try and find a way to monetise it either by writing an exploit or selling it to some bigger criminal gangs etc.

    Since these flaws appear to be in the security processor and in AMD's equiv. to the Intel Management Engine (which has plenty of flaws itself), they were unlikely to be readably monetizable, so what was a malware 'researcher' like CTS Labs to do?

    Maybe get together with a company specialising in share short selling and then release their 'findings' in the most sensational way possible?

    Or at least that is one possible explantation.
    Well they made CrowdCores which quietly gets onto people's computers to mine Bitcoins and then changed the name of the company,etc to hide the fact they did it.Their CFO worked for the unit who were according to the media behind things like Stuxnet(look on their own website as he boasts about having served with them).

  16. #76
    Senior Member
    Join Date
    Jul 2009
    Location
    West Sussex
    Posts
    1,722
    Thanks
    199
    Thanked
    243 times in 223 posts
    • kompukare's system
      • Motherboard:
      • Asus P8Z77-V LX
      • CPU:
      • Intel i5-3570K
      • Memory:
      • 4 x 8GB DDR3
      • Storage:
      • Samsung 850 EVo 500GB | Corsair MP510 960GB | 2 x WD 4TB spinners
      • Graphics card(s):
      • Sappihre R7 260X 1GB (sic)
      • PSU:
      • Antec 650 Gold TruePower (Seasonic)
      • Case:
      • Aerocool DS 200 (silenced, 53.6 litres)l)
      • Operating System:
      • Windows 10-64
      • Monitor(s):
      • 2 x ViewSonic 27" 1440p

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Quote Originally Posted by CAT-THE-FIFTH View Post
    Well they made CrowdCores which quietly gets onto people's computers to mine Bitcoins and then changed the name of the company,etc to hide the fact they did it.Their CFO worked for the unit who were according to the media behind things like Stuxnet(look on their own website as he boasts about having served with them).
    Cryptocoin malware and Stuxnet. So not just straight malware 'researchers' but with possible links to state actors. Since Intel is such a huge part of the Israeli tech and wider economy this may all be even more sinister than mere stock market manipulation.

    Not that I'm saying that Intel has anything to do with this, but due to the nature of Israeli nationalism and its close ties to their their security state, someone may do this kind of thing by themselves; and if consequently they enrich themselves with a bit of stock market manipulation...

    That might also explain how a 3 person upstart in the security business was able to find all these 'flaws' so quickly.

  17. Received thanks from:

    Pleiades (15-03-2018)

  18. #77
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    I was only reading the AT thread on it,but decided to look at their biography page properly:

    http://cts-labs.com/management-team

    Worth a read.
    Last edited by CAT-THE-FIFTH; 14-03-2018 at 07:20 PM.

  19. #78
    Senior Member
    Join Date
    Aug 2003
    Location
    Wonderful Warwick!
    Posts
    3,919
    Thanks
    4
    Thanked
    183 times in 153 posts

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    Oh dear - it appears I've missed the mud slinging. I'm not worried as on first thoughts these problems are no worse or better than other ones that have come up.
    On the moderation note - I've not agreed with several people on here. Saracen and cat-the-right especially. But if I saw them in the pub I'd buy them a pint and have a nice strong debate about something, probably the beer! That's because although I don't necessarily agree with them I appreciate they can be right or wrong but debate fairly. Without too much name calling... which is damn right how it should be!
    Old puter - still good enuff till I save some pennies!

  20. Received thanks from:

    CAT-THE-FIFTH (14-03-2018),DavidM (15-03-2018),peterb (15-03-2018),Saracen (15-03-2018)

  21. #79
    Registered+
    Join Date
    Jul 2016
    Posts
    24
    Thanks
    0
    Thanked
    1 time in 1 post

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    GamersNexus did a real good video on this: https://youtu.be/ZZ7H1WTqaeo

    Basically if the exploit is true it would pretty much require physical/local access to the computer, as Steve says in the video a bit like someone leaving their login details on a post-it note stuck to the monitor would be needed to take advantage of these exploits.

  22. #80
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    13,009
    Thanks
    781
    Thanked
    1,568 times in 1,325 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 5900X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 2TB Linux, 2TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 39 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 900Mb/900Mb (CityFibre FttP)

    Re: AMD processors impacted by 13 serious flaws, says CTS Labs

    I just stumbled across this XKCD prediction of 2018 vulnerabilities and was reminded of this thread

    https://xkcd.com/1957/

    "An attacker can execute malicious code on their own machine an no-one can stop them"

  23. Received thanks from:

    afiretruck (16-03-2018),aidanjt (15-03-2018),CAT-THE-FIFTH (14-03-2018),chinf (15-03-2018),Kanoe (15-03-2018),Output (15-03-2018),peterb (15-03-2018),Pleiades (15-03-2018),satrow (15-03-2018),Xlucine (14-03-2018)

Page 5 of 7 FirstFirst ... 234567 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •