Title: New 'ZombieLoad' Vulnerability Affects Intel Chips Dating Back to 2011, Apple Released Patch in macOS 10.14.5 [Updated] Post by: HCK on May 18, 2019, 04:05:09 pm New 'ZombieLoad' Vulnerability Affects Intel Chips Dating Back to 2011, Apple Released Patch in macOS 10.14.5 [Updated]
Security researchers have discovered a new set of vulnerabilities that affect Intel chips dating back to 2011, including the chips that have been used in Apple devices. As outlined by TechCrunch (https://techcrunch.com/2019/05/14/zombieload-flaw-intel-processors/), "ZombieLoad (https://zombieloadattack.com)," as it's being called, consists of four bugs that can allow hackers to exploit the design flaws in the chips to steal sensitive information directly from the processor. <img src="(http://cdn.macrumors.com/article-new/2019/05/zombieload-800x526.jpg)" alt="" width="800" height="526" class="aligncenter size-large wp-image-692882" /> These vulnerabilities are as serious as the Meltdown and Spectre vulnerabilities (https://www.macrumors.com/2018/01/04/apple-meltdown-spectre-vulnerability-fixes/) that were discovered in early 2018 and take advantage of the same speculative execution process, which is designed to speed up data processing and performance. A white paper shared by notable security researchers (including some who worked on Spectre and Meltdown) offers details on how ZombieLoad functions. [PDF (https://zombieloadattack.com/zombieload.pdf)] While programs normally only see their own data, a malicious program can exploit the fill buffers to get hold of secrets currently processed by other running programs. These secrets can be user-level secrets, such as browser history, website content, user keys, and passwords, or system-level secrets, such as disk encryption keys.ZombieLoad impacts almost every Intel computer dating back to 2011, but AMD and ARM chips are not affected. A demonstration of ZombieLoad was shared on YouTube, displaying how it works to see what you're doing on your computer. While spying on web browsing is demoed, it can also be used for other purposes like stealing passwords. <center><iframe src="https://www.youtube.com/embed/wQvgyChrk_g" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></center> There have been no reports of hackers taking advantage of the ZombieLoad vulnerabilities at this time, and Intel has released microcode for vulnerable processors. Apple addressed the vulnerability (https://support.apple.com/en-us/HT210107) in the macOS Mojave (https://www.macrumors.com/roundup/macos-10-14/) 10.14.5 update that was released yesterday and in security patches for older versions of macOS that were also released yesterday. Apple has released security updates in <!---->macOS Mojave<!----> 10.14.5 to protect against speculative execution vulnerabilities in Intel CPUs.An Apple support document (https://support.apple.com/en-us/HT210107) on the ZombieLoad vulnerability provides details for "full mitigation" protection that can be enabled for customers with computers at heightened risk or that run untrusted software on their Macs. Full mitigation requires using the Terminal app to enable additional CPU instructions and disable hyper-threading processing technology, which is available for <!---->macOS Mojave<!---->, High Sierra, and Sierra, but not on certain older machines. Apple says full mitigation could reduce performance by up to 40 percent, so most users will not want to enable it. According to Intel, its microcode updates will have an impact on processor performance, but for the patch that Apple released in <!---->macOS Mojave<!----> 10.14.5, there was no measurable performance impact. Apple's fix prevents the exploitation of ZombieLoad vulnerabilities via JavaScript in Safari. An Intel spokesperson told TechCrunch that most patched consumer devices could take a 3 percent performance hit at worst, and as much as 9 percent in a datacenter environment. But, the spokesperson said, it was unlikely to be noticeable in most scenarios.As mentioned above, customers who enable Apple's full mitigation option will indeed see processor slowdowns because of the need to disable hyper-threading. One of the researchers who discovered ZombieLoad, Daniel Gruss, told TechCrunch that ZombieLoad is easier to exploit than Spectre, but more difficult than Meltdown, and that it requires a specific set of skills, which means the average person doesn't need to worry. Update: This article previously said that Apple would release a patch, but it has been updated to clarify that Apple addressed the issue in security updates made available to Mac owners yesterday. Customers running Mojave should update to macOS 10.14.5, while customers running older versions of macOS should install any available security updates. This article, "New 'ZombieLoad' Vulnerability Affects Intel Chips Dating Back to 2011, Apple Released Patch in macOS 10.14.5 [Updated] (https://www.macrumors.com/2019/05/14/zombieload-intel-chip-vulnerability/)" first appeared on MacRumors.com (https://www.macrumors.com) Discuss this article (https://forums.macrumors.com/threads/zombieload-intel-chip-vulnerability.2181312/) in our forums <div class="feedflare"> <img src="http://feeds.feedburner.com/~ff/MacRumors-Front?d=yIl2AUoC8zA" border="0"></img> (http://feeds.macrumors.com/~ff/MacRumors-Front?a=mP6cLNT8rRM:pmOsr_x2HBY:yIl2AUoC8zA) <img src="http://feeds.feedburner.com/~ff/MacRumors-Front?d=6W8y8wAjSf4" border="0"></img> (http://feeds.macrumors.com/~ff/MacRumors-Front?a=mP6cLNT8rRM:pmOsr_x2HBY:6W8y8wAjSf4) <img src="http://feeds.feedburner.com/~ff/MacRumors-Front?d=qj6IDK7rITs" border="0"></img> (http://feeds.macrumors.com/~ff/MacRumors-Front?a=mP6cLNT8rRM:pmOsr_x2HBY:qj6IDK7rITs) </div><img src="http://feeds.feedburner.com/~r/MacRumors-Front/~4/mP6cLNT8rRM" height="1" width="1" alt=""/> Source: New 'ZombieLoad' Vulnerability Affects Intel Chips Dating Back to 2011, Apple Released Patch in macOS 10.14.5 [Updated] (https://www.macrumors.com/2019/05/14/zombieload-intel-chip-vulnerability/) |