Page 5 of 5 FirstFirst ... 2345
Results 65 to 73 of 73

Thread: AMD shares mitigation plans for Zen chipset security flaws

  1. #65
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: AMD shares mitigation plans for Zen chipset security flaws

    Quote Originally Posted by Corky34 View Post
    No, I'm not comfortable with what I've not said being contested, especially when i specifically said remote attack and someone overlooks the remote part and focuses on the attack part in order to make it appear to only be about semantics, in other words giving the impression that you were refuting my argument, while actually refuting an argument that was not presented by me.
    I think the issue I have with what you're saying is you have a perception that a remote attack is anything that is done or actioned remotely. When the actual definition is far more muddy, most people define a Remote Attack as something akin to DNS poisoning, DOS, TCP sequence and desync attacks or even just a port a scan.

    Now the semantic-e facetious c... in me perceives what you're actually getting across is a Remote Exploit.

    However, a remote exploit that needs local access to actually run the in the first place is not a "Remote Attack" or even a "Remote Exploit". It is a local exploit/attack. To muddy it even further, if you use a remote exploit (like mimikatz) to garner local administrative creds to then action the local exploit (reflash bios), are the CTS Labs proposed vulnerabilities a remote attack.

    The answer begins with n and ends in o.

  2. #66
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    12,986
    Thanks
    781
    Thanked
    1,588 times in 1,343 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 5900X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 2TB Linux, 2TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 39 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 900Mb/900Mb (CityFibre FttP)

    Re: AMD shares mitigation plans for Zen chipset security flaws

    Quote Originally Posted by Corky34 View Post
    We're going to have to agree to disagree on the definition of remote access then as in my book if you're typing "net use \\10.0.01\C$ /u:Builtin\Administrator *" into a local command prompt you're using the network to access the hidden C drive share on a device with that IP, you're connecting to another computers shared resources.
    If I punch someone in the face, that is a car based attack because I drove there before getting out of the car and hitting them?

    There is no grey area here, it is a local attack. Use of a network is incidental, the attack could have been done with no network present because it isn't a necessary part of the attack.

    Edit: And I think that video was intended to blur the use of the network to make people believe it is a network attack. That was at best incompetent of them, at worst dishonest.
    Last edited by DanceswithUnix; 25-03-2018 at 11:52 AM.

  3. Received thanks from:

    Tabbykatze (25-03-2018),watercooled (25-03-2018)

  4. #67
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: AMD shares mitigation plans for Zen chipset security flaws

    Quote Originally Posted by DanceswithUnix View Post
    If I punch someone in the face, that is a car based attack because I drove there before getting out of the car and hitting them?

    There is no grey area here, it is a local attack. Use of a network is incidental, the attack could have been done with no network present because it isn't a necessary part of the attack.

    Edit: And I think that video was intended to blur the use of the network to make people believe it is a network attack. That was at best incompetent of them, at worst dishonest.
    I think we just pretty much said the same thing, yours was slightly more eloquent

  5. Received thanks from:

    DanceswithUnix (25-03-2018)

  6. #68
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: AMD shares mitigation plans for Zen chipset security flaws

    OK so I'll admit there seems to be different opinions on what defines a remote attack, to me it's attacking a system from another location via a network, for others it seems there's a different definition and that's fair enough, it's not a definition that i recognise or completely understand but c'est la vie i guess.

    Quote Originally Posted by DanceswithUnix View Post
    Edit: And I think that video was intended to blur the use of the network to make people believe it is a network attack. That was at best incompetent of them, at worst dishonest.
    I'd go for incompetent myself as i get the impression they don't understand the exploits themselves, from what i can tell all these attacks seem to boil down to circumventing, in some manner, the checks that the PSP should be doing when installing unsigned and/or modified firmware and even i could guess something like that would only take a few weeks to fix, not the years they claim they were told by "people" in the know.
    Last edited by Corky34; 25-03-2018 at 12:21 PM.

  7. #69
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: AMD shares mitigation plans for Zen chipset security flaws

    Quote Originally Posted by Corky34 View Post
    OK so I'll admit there seems to be different opinions on what defines a remote attack, to me it's attacking a system from another location via a network, for others it seems there's a different definition and that's fair enough, it's not a definition that i recognise or completely understand but c'est la vie i guess.
    There's not really opinions, there's what it is and then there's what that is in this market. The total overall attack could be remotely executed which is what you are misidentifying as a Remote Attack. In the security world, these definitions have to be separate because protecting against a Remote Attack, Remote Exploit and a Local Exploit have very different methods. A Remote Attack can be protected against using Intrusion Detection/Prevention (like Snort) and an anti-DOS engine (Snort also has one). Remote exploits can be protected against very differently depending on the attack types, if it is a Webserver based exploit then I would use a form of IPS like OWASP WAF ruleset, if it is a known CVE that can be remotely utilised as part of a drive by, malicious link or malvertisemet/script then that would be IPS again. Whereas if it is a locally executed exploit (like a Mimikatz Kerberos privilege access which is remotely executed but is a local attack so IPS cannot detect this), I would need an anti-exploit engine like Sophos InterceptX.

    Now reflashing the BIOS? That's not a remote exploit, attack or any of those things...it's standard expected functionality. The only thing that makes this an "attack" is that the PSP is not functioning correctly.

  8. #70
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    12,986
    Thanks
    781
    Thanked
    1,588 times in 1,343 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 5900X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 2TB Linux, 2TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 39 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 900Mb/900Mb (CityFibre FttP)

    Re: AMD shares mitigation plans for Zen chipset security flaws

    Quote Originally Posted by Corky34 View Post
    OK so I'll admit there seems to be different opinions on what defines a remote attack, to me it's attacking a system from another location via a network, for others it seems there's a different definition and that's fair enough, it's not a definition that i recognise or completely understand but c'est la vie i guess.
    Depends how involved you are in the industry. To me it is clear cut, no room for debate.

    OTOH, well to me a Goose is just a Duck that is mostly white and a bit fat isn't it? They are all just a kind of Duck, they look much the same. A Zoologist might disagree, but to me it is just another sort of Duck so me and the zoologist should agree to disagree

    To some people the language use here is critical, so expect them to get stressy over it.

  9. #71
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,478
    Thanks
    1,541
    Thanked
    1,029 times in 872 posts

    Re: AMD shares mitigation plans for Zen chipset security flaws

    Quote Originally Posted by Corky34 View Post
    I'd go for incompetent myself as i get the impression they don't understand the exploits themselves, from what i can tell all these attacks seem to boil down to circumventing, in some manner, the checks that the PSP should be doing when installing unsigned and/or modified firmware and even i could guess something like that would only take a few weeks to fix, not the years they claim they were told by "people" in the know.
    That's what I've been thinking to be honest, particularly the part I've highlighted. Malicious or incompetent are the options, I can't think of a way in which neither of those are true. Their report reads kinda like it's been written by a journalist operating outside of their expertise and/or being deliberately inflammatory and misleading.

  10. #72
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: AMD shares mitigation plans for Zen chipset security flaws

    Quote Originally Posted by DanceswithUnix View Post
    Depends how involved you are in the industry. To me it is clear cut, no room for debate.
    That does seem to be what confused me, I've done a lot more reading and like you say that's how the industry views it whereas the common language terms of "local" and "remote" point to a more literal (is that the right word?) understanding of the terms, it also makes what they're claiming, in hind sight of learning the differences, seem even more peculiar.

    I don't know if AMD will release the technical details once they've been patched but i hope they do so everyone can asses CTS-Labs findings.

  11. #73
    Registered+
    Join Date
    Jul 2017
    Location
    Strand, Cape Town, Western-Cape
    Posts
    81
    Thanks
    26
    Thanked
    5 times in 5 posts
    • KN1GHT's system
      • Motherboard:
      • Asus Hero 6 x370 (Wi-Fi)
      • CPU:
      • AMD R7-1700 @ 3.918GHz (1.35v)
      • Memory:
      • 32GB's of 3200MHz Gskill Ripjaws @ 3066MHz
      • Storage:
      • 250GB Samsung 960 EVO, 250GB 5400RPM, 500GB 7200RPM, 1TB 7200RPM, 2TB 7200RPM
      • Graphics card(s):
      • 1xPalit Zetstream GTX1080ti @ 2025Core & 5900Mem
      • PSU:
      • Andyson AD-700YYZZZ N Series 700W 80 Plus Titanium Certified Semi-Modular Black Desktop Power Supply
      • Case:
      • Phanteks PH-EC416PSTG_BK Eclipse P400S Silent-Edition Tempered Glass Satin Black Steel
      • Operating System:
      • Dual Boot Windows 7 Pro & Windows 10 Pro
      • Monitor(s):
      • 1xSamsung 32inch LED TV (1366x768 native) & 1xAcer 23inch (1920x1080) using DSR (3840x2160)
      • Internet:
      • 4mbps uncapped

    Re: AMD shares mitigation plans for Zen chipset security flaws

    This whole thing really irks me, CTS Labs and Viceroy research need to be put in their place and even closed down if possible.

    That said going through the facts it does seem that stock manipulation were mostly a smoke screen, side objective or absolute stupidity, because firstly even after specter and meltdown which were much more serious, Intel didn't really notice stock change.

    Looking at all the coincidences, it does seem like Intel was behind everything especially because a lot of the above will be effecting them just as much especially since they use the same third party chips in their chip-sets.

    Not to mention that Intel has a good deal of foot prints in Israel, just like CTS Labs.

    To me the fact that they refrain from mentioning Intel anywhere seem to be the most damming evidence of all.

Page 5 of 5 FirstFirst ... 2345

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •