TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: ALL
from: VIRUS
date: 2018-01-03 22:58:00
subject: Questions about Spectre /

Is there a definative list of CPU models that are affected by Spectre / 
Meldown?

The most "detailed" explanation I can find is:

=============
"every processor since 1995 (except Intel Itanium and Intel Atom before 
2013)" is affected by Meltdown"
==============

I'd like to see a complete breakdown of the status of all Intel CPU's, 
going back to at least the SLOT-1 products and including socket 370, 
socket 478 and socket 775.

Also, what is status of Zeon CPU's, specifically socket 775-compatible ones?

Other questions:

These exploits don't seem to be able to take control of systems, alter 
protected or system memory or proccesses (or even user-space memory or 
files?), plant or install back doors or other forms of persistent 
access.  Yes?

These exploits make it possible for specifically-crafted code to be able 
to read system memory (ie - memory / data that they wouldn't normally 
have access to) but not necessarily be able to alter or corrupt said 
memory?  Yes?

Other than executing a binary delivered via email, is it possible to 
deliver a workable Spectre / Meltdown exploit in the form of a script 
written in any of the various web/browser compatible formats (JS, Java, 
html, etc)?
--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.