Article Details
Scrape Timestamp (UTC): 2023-12-09 11:55:59.543
Source: https://thehackernews.com/2023/12/slam-attack-new-spectre-based.html
Original Article Text
Click to Toggle View
SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs. Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive information from kernel memory on current and upcoming CPUs from Intel, AMD, and Arm. The attack is an end-to-end exploit for Spectre based on a new feature in Intel CPUs called Linear Address Masking (LAM) as well as its analogous counterparts from AMD (called Upper Address Ignore or UAI) and Arm (called Top Byte Ignore or TBI). "SLAM exploits unmasked gadgets to let a userland process leak arbitrary ASCII kernel data," VUSec researchers said, adding it could be leveraged to leak the root password hash within minutes from kernel memory. Ever wondered why social engineering is so effective? Dive deep into the psychology of cyber attackers in our upcoming webinar. While LAM is presented as a security feature, the study found that it ironically degrades security and "dramatically" increases the Spectre attack surface, resulting in a transient execution attack, which exploits speculative execution to extract sensitive data via a cache covert channel. "A transient execution attack exploits the microarchitectural side effects of transient instructions, thus allowing a malicious adversary to access information that would ordinarily be prohibited by architectural access control mechanisms," Intel says in its terminology documentation. Described as the first transient execution attack targeting future CPUs, SLAM takes advantage of a new covert channel based on non-canonical address translation that facilitates the practical exploitation of generic Spectre gadgets to leak valuable information. It impacts the following CPUs - "Arm systems already mitigate against Spectre v2 and BHB, and it is considered the software's responsibility to protect itself against Spectre v1," Arm said in an advisory. "The described techniques only increase the attack surface of existing vulnerabilities such as Spectre v2 or BHB by augmenting the number of exploitable gadgets." AMD has also pointed to current Spectre v2 mitigations to address the SLAM exploit. Intel, on the other hand, intends to provide software guidance prior to the future release of Intel processors that support LAM. In the interim, Linux maintainers have developed patches to disable LAM by default. The findings come nearly two months after VUSec shed light on Quarantine, a software-only approach to mitigate transient execution attacks and achieve physical domain isolation by partitioning the Last level cache (LLC) to give every security domain exclusive access to a different part of the LLC with the goal of eliminating LLC covert channels. "Quarantine's physical domain isolation isolates different security domains on separate cores to prevent them from sharing corelocal microarchitectural resources," the researchers said. "Moreover, it unshares the LLC, partitioning it among the security domains."
Daily Brief Summary
A new side-channel vulnerability named SLAM, affecting Intel, AMD, and Arm CPUs, has been uncovered by researchers.
SLAM leverages a CPU feature intended for security, ironically increasing the risk of Spectre attacks and enabling kernel data leaks.
The vulnerability could allow unauthorized access to sensitive information, such as root password hashes from kernel memory.
Implementations of Linear Address Masking and analogous features in CPUs inadvertently expanded the Spectre attack surface.
This novel exploit creates a covert channel through non-canonical address translation, compromising future CPU models.
Arm and AMD point to existing mitigations for Spectre as defenses against SLAM, while Intel is working on software guidance for future processors.
In response to the vulnerability, Linux maintainers have taken action to disable the implicated CPU feature by default.
The disclosure of SLAM follows another mitigation approach called Quarantine, aiming to isolate security domains and prevent covert channel attacks via CPU cache.