[Info-vax] Next release of OpenVMS x86
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Jul 20 16:13:56 EDT 2020
On 2020-07-20 19:26:11 +0000, johnwallace4 at yahoo.co.uk said:
> On Monday, 20 July 2020 20:00:56 UTC+1, Stephen Hoffman wrote:
>>
>> And the available tooling options increase with x86-64, even if the
>> exploits aren't usually all that portable. Perl DoS tools and such
>> aside.
>> ...
> I'd have thought that Intel's various "Management Engine"
> vulnerabilities were about as portable and OS-independent as a
> vulnerability can be...
Quite true.
AMT and Intel processors in general have been receiving fixes. And yes,
have been incurring yet newer vulnerabilities, too.
This isn't particularly new exposure for OpenVMS, though. OpenVMS has
been paired with vulnerable iLO management processor options for a
while. HPE was indicating that no fixes were feasible, due to iLO
hardware limits.
Some of the various Intel AMT-related exploit information:
http://blog.ptsecurity.com/2018/01/running-unsigned-code-in-intel-me.html
https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf
https://kakaroto.homelinux.net/2019/11/exploiting-intels-management-engine-part-1-understanding-pts-txe-poc/
https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/
"Fun" with Intel threading:
hhttps://lists.debian.org/debian-devel/2017/06/msg00308.html
ttp://www.daemonology.net/hyperthreading-considered-harmful/
And on capturing hardware bugs:
https://blog.cloudflare.com/however-improbable-the-story-of-a-processor-bug/
https://www.servethehome.com/fake-cisco-switches-in-the-supply-chain-uncovered/
And there are a whole lot more links stashed away, including the rather
porous SGX implementation.
For where other vendors are headed with security and with hardware
including processors and systems:
https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf
https://www.youtube.com/watch?v=OmO_oewq_2c
https://www.servethehome.com/gigabyte-shows-marvell-thunderx3-r282-2u-server/
The x86-64 security tools are fodder for several other discussions,
particularly as VSI gets further along with llvm and clang and related
tooling, and with the x86-64 releases.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list