{"id":4662,"date":"2018-01-11T16:10:39","date_gmt":"2018-01-11T15:10:39","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=4662"},"modified":"2018-01-11T17:24:50","modified_gmt":"2018-01-11T16:24:50","slug":"test-is-my-browser-vulnerable-for-spectre-attacks","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/01\/11\/test-is-my-browser-vulnerable-for-spectre-attacks\/","title":{"rendered":"Test: Is my browser vulnerable for Spectre attacks?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/01\/11\/test-ist-mein-browser-durch-spectre-angreifbar\/\" target=\"_blank\">German<\/a>]Here's a tip for users of devices, who are wondering, if their browser is vulnerable for Spectre attacks. The test is independent of the device and operating system and there is no need to install anything. <\/p>\n<p><!--more--><\/p>\n<h2>Some Background information<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/ce834495e80247d69fdbb8af839954b6\" width=\"1\" height=\"1\">Experienced users are aware of this, so they can skip the section. Since this year we know about to attack methods called Meltdown and Spectre. With these attack methods somebody can attack the computer chips contained in each device by software and access unauthorized data. <\/p>\n<p>This works with (malicious) programs and apps and theoretically even works in a browser when surfing the Internet. This could allow malicious attackers to steal passwords or other sensitive data from users' devices.<\/p>\n<p><img decoding=\"async\" title=\"Meltdown\/Spectre\" alt=\"Meltdown\/Spectre\" src=\"https:\/\/i.imgur.com\/EiTnfDa.jpg\"><\/p>\n<p>The Meltdown method works only on systems with Intel chips and affects Apple's macOS, Microsoft's Windows and Linux. There are already updates that are supposed to make this attack method ineffective. <\/p>\n<p>Unfortunately, there is a second attack method called Spectre, which affects almost all modern CPUs\/chips in all kinds of technical devices and can even be used when browsing with a browser. So, on a malicious web page, you might try to read out the user's device memory to access passwords stored in memory. <\/p>\n<p>This could be mitigated by upgraded browsers that limit the ability to attack via Spectre. And that's exactly what the blog post is about &#8211; how can I test whether my browser is secure (according to current knowledge)?<\/p>\n<blockquote>\n<p>I would like to mention it briefly at this point. I use here the term Meltdown and Spectre as vulnerabilities. Actually, these are the names of the attack methods. The vulnerabilities have other names such as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5753\" target=\"_blank\">CVE-2017-5753<\/a> (Spectre 1, Bounds Check Bypass), <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5715\" target=\"_blank\">CVE-2017-5715<\/a> (Spectre 2, Branch Target Injection) and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5754\" target=\"_blank\">CVE-2017-57<\/a> (Meltdown, Rogue Data Cache Load). To simplify writing, I'm using Meltdown and Spectre within my blog as synonyms for vulnerabilities. Above are 2 Spectre vulnerability mentioned. One can be updated by Browser patches. But there is a 2nd Spectre vulnerability that needs a microcode update for the CPU, which isn't addressed within this blog post. <\/p>\n<\/blockquote>\n<h2>A first test tool for Windows <\/h2>\n<p>Yesterday I described a tool to scan Windows for Meltdown and Spectre (see <a href=\"https:\/\/borncity.com\/win\/2018\/01\/10\/tool-tip-ashampo-spectre-meltdown-cpu-checker\/\">Tool tip: Ashampo Spectre Meltdown CPU-Checker<\/a>). But that tool is available for Windows only \u2013 and the test results doesn't say anything about the browser's vulnerability. <\/p>\n<p><img decoding=\"async\" title=\"Ashampo Spectre Meltdown CPU Checker\" alt=\"Ashampo Spectre Meltdown CPU Checker\" src=\"https:\/\/i.imgur.com\/bcFfwSB.jpg\">  <\/p>\n<p>As soon as the above window appears, click <em>Start Test<\/em> and wait until the program has checked the computer. The Ashampoo Spectre Meltdown CPU Checker performs the test, evaluates the result and displays the results.  <\/p>\n<p><img decoding=\"async\" title=\"Ashampo Spectre Meltdown CPU Checker Pr&uuml;fergebnisse\" alt=\"Ashampo Spectre Meltdown CPU Checker Pr&uuml;fergebnisse\" src=\"https:\/\/i.imgur.com\/0GdHBiZ.jpg\">  <\/p>\n<p>The screenshot above shows the results of a test on my production machine under Windows 7 SP1 and the last Monthly Rollup Update is installed. Actually, I expected the machine to be not vulnerable. But the test says something else: The meltdown gap is indicated as fixed. Spectre has not yet been fixed on this machine. Obviously the fix for Spectre 2 (that need a microcode update) is missing. <\/p>\n<h2>Is your browser vulnerable?<\/h2>\n<p>So I decided to search for a Spectre test that classifies, whether a browser is vulnerable or not. German Blog reader PiXi left a <a href=\"https:\/\/www.borncity.com\/blog\/2018\/01\/11\/slimjet-17-0-4-verfgbar\/#comment-52465\" target=\"_blank\">comment<\/a>, pointing to a website from&nbsp; chinese security provider <em>xlab.tencent.com<\/em>. They are offering <a href=\"http:\/\/xlab.tencent.com\/special\/spectre\/spectre_check.html\" target=\"_blank\">this test<\/a> useable within any browser (just open the link.&nbsp; So I tested several browsers available on my Windows 7 SP1 production machine. <\/p>\n<h3>Internet Explorer 11 and Microsoft Edge<\/h3>\n<p>I've installed the Monthly Rollup Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056894\/windows-7-update-kb4056894\" target=\"_blank\">KB4056894<\/a> (see <a href=\"https:\/\/borncity.com\/win\/2018\/01\/05\/critical-security-updates-for-windows-7-8-1-server-01-03-2018\/\">Critical Security Updates for Windows 7\/8.1\/Server (01\/03\/2018)<\/a>). So I launched IE 11 end entered <a href=\"http:\/\/xlab.tencent.com\/special\/spectre\/spectre_check.html\" target=\"_blank\">this URL<\/a>. That's what IE 11 reported so far.<\/p>\n<p><img decoding=\"async\" title=\"Spectre im Internet Explorer\" alt=\"Spectre im Internet Explorer\" src=\"https:\/\/i.imgur.com\/6Z7CVYh.jpg\"><\/p>\n<p>My Internet Explorer isn't vulnerable to Spectre (1). In a 2nd step I decided to run also a test with Edge browser on Microsoft Windows 10. Here is the result: Edge isn't vulnerable too.<\/p>\n<p><img decoding=\"async\" title=\"Spectre im Edge\" alt=\"Spectre im Edge\" src=\"https:\/\/i.imgur.com\/e3i9sG6.jpg\"><\/p>\n<h3>What's about Firefox 57.0.4?<\/h3>\n<p>I've Firefox version 57.0.4 as a portable app on my Windows 7 machine. According to Mozilla, this version has been patched against Spectre. Here is, what I got as a result \u2013 Firefox 57.0.4 isn't vulnerable. <\/p>\n<p><img decoding=\"async\" title=\"Spectre im Firefox 57.0.4\" alt=\"Spectre im Firefox 57.0.4\" src=\"https:\/\/i.imgur.com\/gWkj1Fb.jpg\"><\/p>\n<h2>Google Chrome and Slimjet<\/h2>\n<p>At least I tried to check Google Chrome (and the derived Slimjet browser). Chrome will be patched at end of January 2018. But it's possible to set the option S<em>trict site isolation<\/em>, to isolate tabs in browser (see <a href=\"https:\/\/borncity.com\/win\/2018\/01\/11\/how-to-mitigate-spectre-in-google-chrome\/\">How to mitigate Spectre in Google Chrome<\/a>). Here is the test result from Google Chrome, hardened using <em>Strict site isolation<\/em>. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"Spectre im Google Chrome\" alt=\"Spectre im Google Chrome\" src=\"https:\/\/i.imgur.com\/Dh9OAtR.jpg\" width=\"597\" height=\"494\"><\/p>\n<blockquote>\n<p>As mentioned within my blog post <a href=\"https:\/\/borncity.com\/win\/2018\/01\/11\/how-to-mitigate-spectre-in-google-chrome\/\">How to mitigate Spectre in Google Chrome<\/a>; I've had the situation, where Google Chrome did not pass the Spectre vulnerability test successfully. Restarting the browser fixed this and Chrome was successful in Spectre tests. <\/p>\n<\/blockquote>\n<p>The Slimjet-Browser 17.0.4 seems to be more critical. Although slimjet is a Chrome cloen, the approach using <em>Strict site isolation <\/em>seems not to work. I've activated that flag, but the test result shown below, says that the browser is vulnerable. <\/p>\n<p><img decoding=\"async\" title=\"Spectre im Slimjet 17.0.4\" alt=\"Spectre im Slimjet 17.0.4\" src=\"https:\/\/i.imgur.com\/6QIl2LF.jpg\"><\/p>\n<p>The test discussed above may be used also with other browsers and on other operating systems (macOS, iOS, Android, Linux). <\/p>\n<blockquote>\n<p>Note about the accuracy of this test from tencent's site: If the result is VULNERABLE, it is definitely true. However, if the result is NOT VULNERABLE, it doesn't mean your browser is absolutely not vulnerable because there might be other unknown attacking methods.<\/p>\n<\/blockquote>\n<p><strong>Similar articles<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2018\/01\/04\/microsoft-releases-windows-10-patch-to-fix-intel-bug\/\">Microsoft releases Windows 10 Patch to fix Intel Bug<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/01\/04\/critical-updates-for-windows-and-browser-01-03-2018\/\">Critical Updates for Windows and Browser (01\/03\/2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/01\/05\/critical-security-updates-for-windows-7-8-1-server-01-03-2018\/\">Critical Security Updates for Windows 7\/8.1\/Server (01\/03\/2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/01\/04\/windows10-critical-updates-01-03-2018\/\">Windows 10: Critical Updates (01\/03\/2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/01\/08\/windows-7-8-1-updates-kb4056894-kb4056895-released\/\">Windows 7\/8.1: Updates KB4056894, KB4056895 released<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/01\/10\/tool-tip-ashampo-spectre-meltdown-cpu-checker\/\">Tool tip: Ashampo Spectre Meltdown CPU-Checker<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/01\/10\/microsoft-patchday-office-flash-windows-january-9-2018\/\">Microsoft Patchday: Office, Flash, Windows (January 9, 2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/01\/11\/how-to-mitigate-spectre-in-google-chrome\/\">How to mitigate Spectre in Google Chrome<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Here's a tip for users of devices, who are wondering, if their browser is vulnerable for Spectre attacks. The test is independent of the device and operating system and there is no need to install anything.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[872,580,2],"tags":[34,69,1215],"class_list":["post-4662","post","type-post","status-publish","format-standard","hentry","category-browser","category-security","category-windows","tag-browser","tag-security","tag-spectre"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=4662"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4662\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=4662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=4662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=4662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}