19-03-2019, 09:27
<r><ALIGN align="center"><s>
</s>
<SIZE size="150"><s></s>Alerte SPOILER : une nouvelle faille dans l'architecture Intel Core<e></e></SIZE><br/>
Après Meltdown et Spectre, voici une nouvelle faille de sécurité au doux nom poétique : SPOILER. Mise en évidence par des chercheurs du Worcester Polytechnic Institute et l'université de Lübeck, cette faille concerne les processeurs Intel exploitant l'architecture Core. Autant dire que la liste est relativement longue, avec des modèles qui ont désormais quelques années et qui sont disponibles dans les solutions mobiles, fixes et autres stations de travail ou serveurs. Plusieurs processeurs allant de Nehalem à Kaby Lake R ont été testés, ainsi qu'un T9400 mais sans détail pour ce dernier.<br/>
<br/>
<URL url="https://ibb.co/vzmxhbX"><s></s><IMG src="https://i.ibb.co/vzmxhbX/image.png"><s>[img]</s>https://i.ibb.co/vzmxhbX/image.png<e>[/img]</e></IMG><e></e></URL><br/>
<br/>
C'est sur les adressages mémoire que se trouve la faille, qui peut être mise en évidence via un des exécutions spéculatives. Le taux d'accès aux informations serait de 100% en combinant différentes attaques, dont du rowhammer. L'accès à des informations non sécurisées est alors possible, et ce même dans des environnements virtualisés.<br/>
<br/>
Prévenu en décembre dernier, Intel affirme qu'un développement correct des logiciels devrait suffire à se protéger, dixit Phoronix.
<e>
</e></ALIGN></r>
<SIZE size="150"><s></s>Alerte SPOILER : une nouvelle faille dans l'architecture Intel Core<e></e></SIZE><br/>
Après Meltdown et Spectre, voici une nouvelle faille de sécurité au doux nom poétique : SPOILER. Mise en évidence par des chercheurs du Worcester Polytechnic Institute et l'université de Lübeck, cette faille concerne les processeurs Intel exploitant l'architecture Core. Autant dire que la liste est relativement longue, avec des modèles qui ont désormais quelques années et qui sont disponibles dans les solutions mobiles, fixes et autres stations de travail ou serveurs. Plusieurs processeurs allant de Nehalem à Kaby Lake R ont été testés, ainsi qu'un T9400 mais sans détail pour ce dernier.<br/>
<br/>
<URL url="https://ibb.co/vzmxhbX"><s></s><IMG src="https://i.ibb.co/vzmxhbX/image.png"><s>[img]</s>https://i.ibb.co/vzmxhbX/image.png<e>[/img]</e></IMG><e></e></URL><br/>
<br/>
C'est sur les adressages mémoire que se trouve la faille, qui peut être mise en évidence via un des exécutions spéculatives. Le taux d'accès aux informations serait de 100% en combinant différentes attaques, dont du rowhammer. L'accès à des informations non sécurisées est alors possible, et ce même dans des environnements virtualisés.<br/>
<br/>
Prévenu en décembre dernier, Intel affirme qu'un développement correct des logiciels devrait suffire à se protéger, dixit Phoronix.
<e>
<t></t>


![[-]](https://www.tisi-fr.com/board/images/collapse.png)