Vulnerability Found In Intel CPU Caching

Flaw could allow attackers to remotely control Intel-based devices or extract data from memory

Dark Reading Staff, Dark Reading

March 20, 2009

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Two sets of researchers this week separately released papers about exploits for a vulnerability discovered in Intel's CPU caching mechanisms.

Joanna Rutkowska, who made a splash when she published the infamous "Blue Pill" rootkit two years ago, unveiled the new exploit in her blog yesterday, complete with a paper describing how it works.

Separately, researcher Loic Duflot presented a paper on the same vulnerability yesterday at the CanSecWest conference. Rutkowska gives Duflot the credit for creating the first exploit of the vulnerability.

In a nutshell, the exploits describe ways in which an attacker might use flaws in Intel's CPU caching technology to access the memory of an Intel-based machine, or to gain remote control of that machine. This is the third vulnerability that Rutkowska's Invisible Things Lab has discovered in the Intel processor in the past 10 months; she presented a paper on weaknesses in the Intel Trusted Execution Technology (TXT) at the Black Hat DC conference last month.

"It seems that the current state of firmware security, even in case of such reputable vendors as Intel, is quite unsatisfying," Rutkowska said in her blog.

Intel has been informed of the vulnerabilities, the researchers said, though it is not clear when patches might be forthcoming.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights