Welcome, Guest. Please login or register.

Author Topic: Life after NX: The Next New Attack Vendor  (Read 783 times)

Description:

0 Members and 1 Guest are viewing this topic.

Offline FloidTopic starter

  • Hero Member
  • *****
  • Join Date: Feb 2003
  • Posts: 918
    • Show only replies by Floid
Life after NX: The Next New Attack Vendor
« on: July 23, 2004, 10:43:14 AM »
On my way out the door, and as an AMD fanholder, this hurts, but RealWorldTech has an analysis of the K8 microcode update mechanism, which could be the Next Big Thing in evil.  Much harder than just injecting some shellcode, but when that vector dies, something else must take its place.

Props to TheInquirer.

Meanwhile, Intel's implementation of the 'NX' bit (I forget their buzzword) only works with PAE-36(?) enabled... but few things (like no current Windows versions?) do that at present, so life on that side of the fence will stay just as interesting.
 

Offline mikeymike

  • Hero Member
  • *****
  • Join Date: Nov 2002
  • Posts: 3413
  • Country: 00
    • Show only replies by mikeymike
Re: Life after NX: The Next New Attack Vendor
« Reply #1 on: July 23, 2004, 10:58:34 AM »
I don't know much about processor architecture or software workarounds for issues, but I imagine the workaround for this is going to be much the same as with previous processor bugs, such as the Pentium F00F bug...
 

Offline FloidTopic starter

  • Hero Member
  • *****
  • Join Date: Feb 2003
  • Posts: 918
    • Show only replies by Floid
Re: Life after NX: The Next New Attack Vendor
« Reply #2 on: July 24, 2004, 02:25:19 AM »
Having gotten back in the door...

Quote

mikeymike wrote:
I don't know much about processor architecture or software workarounds for issues, but I imagine the workaround for this is going to be much the same as with previous processor bugs, such as the Pentium F00F bug...
See, this isn't even 'bug.'  It's a design decision.  (Where have we heard that before?  No, but seriously...)  AMD did what seemed like a very 'sane' thing, and didn't obfuscate the procedure at all.  However, since they are in the middle of nullifying a whole other class of exploitable 'design decision,' if this gets documented readily enough, and someone comes up with a useful way to exploit it (presently, how many normal users are running XP with Admin privs?)... it could be moderately-large T Trouble, with the value of T increasing proportional with the popularity of K8 vs. Intel.

The value of the vulnerability (and the potential to somehow crash a moderately large subset of boxes is, of course, the definition of 'vulnerability') is blunted by the need to have 'root' priveleges by other means, but as the article notes, it opens the door to some sneaky tricks -- mostly more subtle versions of hacks known today (turning what was previously a NOP into something useful, suddenly activating and privelege-escalating a payload quiescent in a widely-distributed DLL), or more usefully destructive versions of same (you can fry anyone's hardware already by sending vCore through the roof, but that only works mainboard by mainboard; an attack that works across a whole class of CPU -- and yes, this does hinge on whether the microcode is actually capable of doing anything so terrible -- is much more usefully kid-accessible if wanton destruction is the goal).

The obvious solution is to not run potentially-hostile or potentially-exploitable (in other ways) software under Ring 0, AKA 'Administrator' or 'root.'  Fairly straightforward (certain 'alternative' OSes have, of course, encouraged this practice for years), but not innately as simple as patching against F00F.  

A secondary level of protection would involve scanning for the signature of a microcode patcher, with the same overhead as any other form of 'virus' scanning takes today.  (Too much, really.)

Or, point taken, the kernel itself could lock out all attempts to write to that MSR, but that poses a chicken-and-egg every time there's a good reason for the kernel vendor to apply an update that the BIOS vendor/distributor didn't.  --  Rare now, but becoming less rare as complexity grows, and I can only assume Microsoft is a major distribution channel for 'necessary' (for the 'stable' function of Windows) updates, absent the guarantee of every BIOS shipper's cooperation in every product ever made. If the kernel will load the proverbial trustedupdate.rom before enabling protections each boot, then, at least for the unlikely but severe-if-possible hardware-frying case, it's 'worth' an attacker's trouble to figure out how to modify said blocks on disk.

Not the end of the world, but one more confounding annoyance in it.  In the worst (hopefully impossible) case, a "Click here to run this file purporting to be a screensaver that actually manages to do permanent damage to your CPU" worm -- helpfully propagated by 'immune' users of alternate product, of course -- would be an expensive counter to the advance in security these chips otherwise provide.  ["We're too smart for that!," sure, so instead let's slip it into a supply-side hack on something popular... like, say, an adware-removal util that naturally needs such priveleges to do its work.]
 

Offline weirdami

  • Hero Member
  • *****
  • Join Date: Jan 2003
  • Posts: 3776
    • Show only replies by weirdami
    • Http://Bindingpolymer.com
Re: Life after NX: The Next New Attack Vendor
« Reply #3 on: July 24, 2004, 02:51:41 AM »
Quote
...(presently, how many normal users are running XP with Admin privs?)...


Practically all of them.
----
Binding Polymer: Keeping you together since 1892.