Pentium 4 loophole could let in hackers

By Peter Judge
http://news.com.com/Pentium+4+loophole+could+let+in+hackers/2100-7355_3-5708
868.html

Story last modified Mon May 16 10:08:00 PDT 2005


Intel is acting to calm fears that technology in its Pentium 4 processors
will enable hackers to steal passwords by reading 'footprints' in the cache.

Hyperthreading, introduced in Intel's Pentium 4, could allow hackers to
access secure information, according to Colin Percival, a 23-year-old Ph.D.
student from Vancouver. The technology makes software run faster by letting
two threads run on the same processor at the same time. Percival has
developed a sophisticated attack based on timing, which exploits the fact
that both processes can access the same cache memory.

The attack, revealed on Friday in a paper delivered at the BDSCan conference
in Ottawa, relies on a spy process installed on the server and sharing the
L2 cache with an OpenSSL cryptographic process. The spy process observes the
time taken for certain cache operations and deduces what the other process
is doing (which Percival refers to as "footprints in the cache"), gathering
information that could help crack the desired password.

Intel, which was informed of the problem in March, says the risk is very
low. It only works on a server that has already been compromised to allow a
malicious hacker to install a spy process. If the hacker has already
achieved this, there are many easier and quicker ways to steal data, Intel
spokesman Howard High said.

The attack could also affect any other processor that shares resources and
not just Intel chips or hyperthreading chips, Intel has pointed out.
Nevertheless, the Santa Clara, Calif.-based chip giant expects future
versions of the Microsoft Windows and Linux operating systems to fix the
problem.

Since discovering the flaw in October 2004, Percival has been working with
FreeBSD and other operating systems developers to assess the risks, and
various responses are posted on his site. Operating systems that do not
exploit hyperthreading and keep it disabled, such as SCO's UnixWare, are
said to be immune.

Peter Judge of ZDNet UK reported from London.



You are a subscribed member of the infowarrior list. Visit 
www.infowarrior.org for list information or to unsubscribe. This message 
may be redistributed freely in its entirety. Any and all copyrights 
appearing in list messages are maintained by their respective owners.

Reply via email to