TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: All
from: Virus
date: 2018-01-04 23:37:00
subject: Re: Questions about Spect

From: Virus 

David W. Hodgins wrote:

> Given this description of seeing full urls, etc, I take it back. It is
> a critical problem, that will have be be mitigated asap.

If I read that article correctly, they haven't actually tested the 
exploit against processors made earlier than 2011.

That leaves a lot of socket 478/775 cpu's as yet to be proved vulnerable.

I would think that speculative execution is a "quirky" function in a 
CPU, and that exactly how it operates depends a great deal on the 
specific CPU die we're talking about, and possibly the microcode 
revision it has?

I would love to see an on-line proof-of-concept test for this. 
Naturally, something "white-hat" in nature.  Barring that, a safe, 
downloadable executable.

If a meltdown exploit is running on a PC, wouldn't windows firewall 
prevent out-bound communication of meltdown-derived data from an 
infected PC to the outside world?

Or is the thinking that the exploit would attempt a privledge escalation 
based on brute-force password testing?

Does Windows have any ability to lock-out an application or process from 
gaining admin-level if it attempts too many password attempts?

Or is the thinking that somehow, meltdown and it's memory-viewing 
ability able to perform privlige escalation upon only a handful of 
attempts, even the first attempt?
--- NewsGate v1.0 gamma 2
                                                                                                
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@pharcyde.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.