{"id":1395,"date":"2019-05-15T14:10:26","date_gmt":"2019-05-15T06:10:26","guid":{"rendered":"https:\/\/tongwing.woon.sg\/blog\/?p=1395"},"modified":"2019-05-15T14:10:26","modified_gmt":"2019-05-15T06:10:26","slug":"ridl-and-fallout-mds-attacks","status":"publish","type":"post","link":"https:\/\/tongwing.woon.sg\/blog\/ridl-and-fallout-mds-attacks\/","title":{"rendered":"RIDL and Fallout: MDS attacks"},"content":{"rendered":"<p>After the spectacle of <a href=\"https:\/\/tongwing.woon.sg\/blog\/critical-flaws-revealed-to-affect-most-intel-chips-since-1995-zdnet\/\">Spectre and Meltdown<\/a> last year, we now have more vulnerabilities that attacks the CPU to leak confidential data. The new vulnerabilities are called RIDL and Fallout &#8211; not quite as catchy as Spectre and Meltdown &#8211; and it belongs to a class of attacks called MDS (Microarchitectural Data Sampling) attacks.<\/p>\n<p>There are <a href=\"https:\/\/mdsattacks.com\/\">exploit demos<\/a> that show the attacker retrieving the contents of hashed passwords in \/etc\/shadow, which he\/she can crack offline after that. Another demo shows an attack being carried out using Javascript\/WebAssembly. Essentially this means that if you visit a web page that contains attack code it can read information from other processes it is not meant to.<\/p>\n<blockquote><p>Our attacks can leak confidential data across arbitrary security boundaries in real-world settings (cloud, browsers, etc.).<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/mdsattacks.com\/\">RIDL and Fallout: MDS attacks<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After the spectacle of Spectre and Meltdown last year, we now have more vulnerabilities that attacks the CPU to leak confidential data. The new vulnerabilities are called RIDL and Fallout &#8211; not quite as catchy as Spectre and Meltdown &#8211; and it belongs to a class of attacks called MDS (Microarchitectural Data Sampling) attacks. There [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,10],"tags":[],"_links":{"self":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1395"}],"collection":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/comments?post=1395"}],"version-history":[{"count":1,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1395\/revisions"}],"predecessor-version":[{"id":1396,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1395\/revisions\/1396"}],"wp:attachment":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/media?parent=1395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/categories?post=1395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/tags?post=1395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}