{"id":215379,"date":"2019-03-06T10:45:19","date_gmt":"2019-03-06T09:45:19","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=215379"},"modified":"2019-03-06T10:45:19","modified_gmt":"2019-03-06T09:45:19","slug":"spoiler-schwachstelle-in-intel-cpus","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/03\/06\/spoiler-schwachstelle-in-intel-cpus\/","title":{"rendered":"SPOILER-Schwachstelle in Intel-CPUs"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>In Intel CPUs gibt es eine weitere Schwachstelle, die spekulative Seitenkanalangriffe erm\u00f6glicht. Die SPOILER genannte Angriffsmethode kombiniert Rowhammer- und Cache-Angriffe. <\/p>\n<p><!--more--><\/p>\n<p>Sicherheitsforschern der Worcester Polytechnic Institute und der Universit\u00e4t zu L\u00fcbeck ist diese Angriffsmethode \u00fcber die spekulative Befehlsausf\u00fchrung auf Intel-Prozessoren gelungen. Damit k\u00f6nnen Angreifer unter bestimmten Bedingungen Informationen aus dem Speicher auslesen. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"Mainboard\" alt=\"Mainboard\" src=\"https:\/\/i.imgur.com\/bsYodMo.jpg\" width=\"618\" height=\"412\"\/><br \/>(Quelle: Pexels <a href=\"https:\/\/www.pexels.com\/u\/fancycrave-60738\/\">Fancycrave<\/a> CC0 License) <\/p>\n<p>Die Details sind im PDF-Dokument <a href=\"https:\/\/arxiv.org\/pdf\/1903.00446.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\"SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks\"<\/a> beschrieben. heise.de hat in <a href=\"https:\/\/www.heise.de\/security\/meldung\/Forscher-entdecken-Informationsleck-SPOILER-in-Intel-CPUs-4326566.html\" target=\"_blank\" rel=\"noopener noreferrer\">diesem Artikel<\/a> einige Informationen ver\u00f6ffentlicht. Weitere Artikel gibt es bei <a href=\"https:\/\/www.theregister.co.uk\/2019\/03\/05\/spoiler_intel_processor_flaw\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Register<\/a> oder <a href=\"https:\/\/www.zdnet.com\/article\/all-intel-chips-open-to-new-spoiler-non-spectre-attack-dont-expect-a-quick-fix\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Intel CPUs gibt es eine weitere Schwachstelle, die spekulative Seitenkanalangriffe erm\u00f6glicht. Die SPOILER genannte Angriffsmethode kombiniert Rowhammer- und Cache-Angriffe.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[5449,4328],"class_list":["post-215379","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-intel-cpu","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/215379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=215379"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/215379\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=215379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=215379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=215379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}