DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!

   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
October 22, 2017 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 54 people online.

 

Latest Reviews
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
Lamptron FC-10 SE fan controller
ZOWIE G-TF Rough mousepad
 

Follow us
RSS
 

Rootkit exploit in Intel CPUs dates back to 1997

Posted on Monday, August 10 2015 @ 11:28:08 CEST by


Security researcher Christopher Domas gave a presentation at the Black Hat conference in Las Vegas about a security issue in Intel's x86 processors that went undiscovered for well over a decade.

Domas explained how a design error in an advanced programmable interrupt controller (APIC) related legacy feature of the System Management Mode, one of the deepest levels of the CPU that operates system errors and grants control to various subsystems, could be exploited to install a rootkit that remains invisible to the operating system.

While such an infection would first require full administrative and root rights on a vulerable PC, the danger of this type of rootkit is that it nestles inside the CPU and is extremely hard to detect and remove. In fact, this exploit targets a part of the CPU that can't even be accessed by the operating system. Domas speculates it could even be possible to set an infected laptop on fire as the exploit can disable energy management.

Intel reportedly fixed the issue with the introduction of its Core i CPUs in 2011 (Sandy Bridge and later) and the Atom CPUs were updated in 2013. Hundreds of millions of systems with older Intel CPUs remain vulnerable though. AMD CPUs may be vulnerable too but Domas said he hasn't investigated any AMD chips so it's unknown whether AMD has implemented APIC in a similar fashion.

Sources: Tweakers



 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2017 DM Media Group bvba