ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    AMD chip flaw

    IT Discussion
    amd
    10
    37
    3.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @IRJ
      last edited by

      @irj said in AMD chip flaw:

      @scottalanmiller said in AMD chip flaw:

      @eonkraft said in AMD chip flaw:

      All these situations look weird. Have anyone seen the official AMD response?

      Not seen anything yet.

      I wonder if these guys were trying to pick up stock really cheap or something. Although Intel wasnt really affected too much with Meltdown/Spectre

      Intel's marketing machine does good damage control. AMD is much more at the whims of the media.

      1 Reply Last reply Reply Quote 1
      • mlnewsM
        mlnews
        last edited by

        https://www.anandtech.com/show/12536/our-interesting-call-with-cts-labs

        1 Reply Last reply Reply Quote 0
        • Emad RE
          Emad R @IRJ
          last edited by

          @irj

          Torvalds wades into CTS Labs' AMD chip security report

          https://www.fudzilla.com/news/45819-torvalds-wades-into-cts-labs-amd-chip-security-report

          "looks more like stock manipulation than a security advisory".

          "If you replace the BIOS or the CPU microcode with an evil version, you might have a security problem?' Yeah."

          "I just found a flaw in all of the hardware space. No device is secure: if you have physical access to a device, you can just pick it up and walk away. Am I a security expert yet?"

          "News flash: If an attacker has the root password, your system is already completely hosed. Everything else is just details."

          "It's the security industry that has taught everybody to not be critical of their findings."

          He also thinks, "there are real security researchers". For many of the rest, it's all about giving even the most minor security bug. In Torvalds' words: "A catchy name and a website is almost required for a splashy security disclosure these days."

          "security people need to understand that they look like clowns because of it. The whole security industry needs to just admit that they have a lot of sh*t going on, and they should use -- and encourage -- some critical thinking."

          Reid CooperR 1 Reply Last reply Reply Quote 5
          • mlnewsM
            mlnews
            last edited by

            http://www.tomshardware.com/news/cts-labs-responds-amd-vulnerability-disclosure,36680.html

            1 Reply Last reply Reply Quote 1
            • Reid CooperR
              Reid Cooper @Emad R
              last edited by

              @emad-r said in AMD chip flaw:

              @irj

              Torvalds wades into CTS Labs' AMD chip security report

              https://www.fudzilla.com/news/45819-torvalds-wades-into-cts-labs-amd-chip-security-report

              "looks more like stock manipulation than a security advisory".

              "If you replace the BIOS or the CPU microcode with an evil version, you might have a security problem?' Yeah."

              "I just found a flaw in all of the hardware space. No device is secure: if you have physical access to a device, you can just pick it up and walk away. Am I a security expert yet?"

              "News flash: If an attacker has the root password, your system is already completely hosed. Everything else is just details."

              "It's the security industry that has taught everybody to not be critical of their findings."

              He also thinks, "there are real security researchers". For many of the rest, it's all about giving even the most minor security bug. In Torvalds' words: "A catchy name and a website is almost required for a splashy security disclosure these days."

              "security people need to understand that they look like clowns because of it. The whole security industry needs to just admit that they have a lot of sh*t going on, and they should use -- and encourage -- some critical thinking."

              This seems to sum it up. This is all way too "weird" to be authentic.

              1 Reply Last reply Reply Quote 1
              • mlnewsM
                mlnews
                last edited by

                AMD confirms that the flaws are real, will have patches in a few weeks.

                1 Reply Last reply Reply Quote 1
                • mlnewsM
                  mlnews
                  last edited by

                  http://www.tomshardware.com/news/amd-response-cts-labs-ryzenfall-masterkey-chimera-fallout,36707.html

                  1 Reply Last reply Reply Quote 0
                  • mlnewsM
                    mlnews
                    last edited by

                    https://arstechnica.com/gadgets/2018/03/amd-promises-firmware-fixes-for-security-processor-bugs/

                    1 Reply Last reply Reply Quote 0
                    • KellyK
                      Kelly
                      last edited by

                      Looks like there is more to the story from a financial perspective: https://www.bloomberg.com/news/articles/2018-03-20/amd-confirms-chip-vulnerability-says-report-exaggerated-danger.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @Kelly
                        last edited by

                        @kelly said in AMD chip flaw:

                        Looks like there is more to the story from a financial perspective: https://www.bloomberg.com/news/articles/2018-03-20/amd-confirms-chip-vulnerability-says-report-exaggerated-danger.

                        I'm not surprised at all.

                        1 Reply Last reply Reply Quote 0
                        • KellyK
                          Kelly
                          last edited by

                          Here is the CTSLabs "Proof of Concept" video: https://www.youtube.com/watch?v=RrhVhFHTe9o. I think they're trying to demonstrate that they can flash the UEFI with a BIOS whose hash doesn't match a valid one. I'm not entirely sure. They lost a ton of credibility when they stated that a typical way for an attacker to hack a server is using the BUILTIN\Administrator account and then copy over the BIOS file to the C$.

                          1 Reply Last reply Reply Quote 2
                          • 1
                          • 2
                          • 2 / 2
                          • First post
                            Last post