Intel CPUs are prone to hacker attacks after a vulnerability in the way they implement the SYSRET instruction was discovered in their x86-64 extension.
The vulnerability could allow hackers to execute code with kernel privileges while in a non-administrator account, or to gain control of a host operating system after escaping a virtual machine. The U.S. Computer Emergency Readiness Team (US-CERT) issued a security advisory in which it thoroughly details the vulnerability.
“Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape,” says the US-CERT.
Several x64-based operating systems like Windows 7, Windows Server 2008 R2, 64-bit FreeBSD, 64-bit NetBSD, as well as systems that include the Xen hypervisor, are exposed to this vulnerability.
While 32-bit operating systems are safe, Intel CPUs that use the Intel 64 extension need the security patches released by Microsoft in their MS12-042 security bulletin.
The VMware virtualization software does not seem affected by the vulnerability as its hypervisor doesn’t use the SYSRET instruction, making the virtualization solution safe from attacks. AMD is also on the list of vendors not affected by the privileged escalation exposure issued by US-CERT. Because the SYSRET instruction is handled differently on AMD CPUs, the CVE-2012-0217 vulnerability does not apply to these chips.
“AMD processors’ SYSRET behavior is such that a non-canonical address in RCX does not generate a #GP while in CPL0. We have verified this with our architecture team, with our design team, and have performed tests that verified this on silicon,” said AMD. “Therefore, this privilege escalation exposure is not applicable to any AMD processor“.
[…] Intel Chips Prone to Hacks – 64-bit OSs Deemed Vulnerable […]
[…] Intel Chips Prone to Hacks – 64-bit OSs Deemed Vulnerable […]
shit, ! that’d be real bad for the host.
Isn’t there any bug fixer for this? Any update? Any software that tackles it ? And how does one get to know if he’s one of the people who are vulnerable, if he has an intel CPU hardware…?
Microsoft issued a couple of security patches for vulnerable 64-bit OSs in their MS12-042 security bulletin. Here’s the link: http://technet.microsoft.com/en-us/security/bulletin/MS12-042
Also, check out the security advisory from US-CERT for more details: http://www.kb.cert.org/vuls/id/649219