We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Intel fixes two CPU vulnerabilities

Researcher still plans to demonstrate hacks

Intel has fixed two critical bugs in its chips, according to a Russian researcher who plans to demonstrate how he could take advantage of the flaws.

Kris Kaspersky, an IT consultant and the author of Hacker Disassembling Uncovered and Data Recovery: Tips and Solutions, is booked to make the demo at the Hack In The Box Security Conference in October in Kuala Lumpur, Malaysia. Kaspersky said he can use the flaws in Intel CPUs to launch a remote attack against a computer - regardless of what software platform it runs.


On Friday, Kaspersky told PC Advisor's sister title Computerworld US that he has been communicating with Intel about the flaws for nearly a month and the company has told him that it fixed the two critical flaws he brought to Intel's attention. Both of the flaws - one in the cache controller and one in the Arithmetic logic unit - could be used by a remote attacker to execute arbitrary code, according to Kaspersky.

He said about a dozen other non-critical bugs that are not remotely executable remain. According to Kaspersky, Intel does not plan to fix them.

Intel did not immediately respond to questions about the existence of the flaws or whether they have been fixed.

In an interview last month, George Alfs, a spokesman for Intel, said: "We have evaluation teams always looking at issues. We'll certainly take a look at this one... All chips have errata, and there could be an issue that needs to be checked. Possibly. We'd have to investigate his paper."

In a summary of his presentation, Kaspersky charged that such CPU bugs actually have damaged computer hard drives without users' knowledge.
He said he was initially planning to show proof-of-concept (POC) code and demonstrate how to use JavaScript code or TCP/IP packet storms against Intel-based machines. But Kaspersky, who does not work for Kaspersky Labs, said today that various people in the industry have asked him to not give out critical parts of the POC code, so he has agreed not to do so, He will, though, still offer up technical details.

"I think if people [are] aware about bugs, they [will] force Intel to fix them," said Kaspersky. "I was asked [to] not make POC code publicly available and I think this is a good point. I was asked [to] not reveal tech info, but [I] disagree, because installing protections on [the] ISP side will prevent all possible attack[s].... Revealing tech details will not cause chaos and mass-attacks, so I'm going to reveal a lot of - but not all."

He added that he will provide some fragments of POCs to explain how the attack works and how to reproduce it, but he will not provide enough so hackers could download ready-for-use POC and run it.

In a previous interview, Dan Olds, an analyst at Gabriel Consulting Group, said that if Kaspersky's allegations are true, everything from PCs to servers could be at risk.

"These allegations are serious and, if true, certainly a cause for concern," added Olds. "Just the fact that this is being widely publicised will act as an enticement for hackers to exploit the alleged weaknesses in the processors. That said, I believe that the author may be entering into the land of hyperbole when he says that these bugs can be exploited regardless of operating system or other security measures. That certainly needs to be proven."


IDG UK Sites

Moto G2 (2014) vs Moto E comparison review: New Moto G is worth the extra cash

IDG UK Sites

Is Apple losing confidence in itself?

IDG UK Sites

Oculus Rift 'Crescent Bay' prototype hands-on: it's an amazing experience

IDG UK Sites

How (and where) to buy an iPhone 6 or iPhone 6 Plus in the UK. Plus: What to do if you pre-ordered...