sábado, 6 de enero de 2018

[PAPERS/INFO/PoCs] Meltdown & Spectre


En lugar de escribir otra nota más del montón sobre Meltdown & Spectre, vamos a dejar a continuación una lista de recursos de información, papers y PoCs  que nos resultaron interesantes.


PAPERS:
https://meltdownattack.com/meltdown.pdf
https://spectreattack.com/spectre.pdf

CVE:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5754

PoC's:
https://www.exploit-db.com/exploits/43427/
https://github.com/Eugnis/spectre-attack 
https://github.com/harsaroopdhillon/meltdown
https://github.com/mniip/spectre-meltdown-poc
https://github.com/corsix/meltdown-poc
https://github.com/raphaelsc/Am-I-affected-by-Meltdown
https://github.com/lgeek/spec_poc_arm
https://github.com/paboldin/meltdown-exploit
https://github.com/speed47/spectre-meltdown-checker (checker)
https://github.com/Viralmaniar/In-Spectre-Meltdown (checker)
https://github.com/GitMirar/meltdown-poc/blob/master/
https://blogs.technet.microsoft.com/ralphkyttle/2018/01/05/verifying-spectre-meltdown-protections-remotely/ (checker)
http://xlab.tencent.com/special/spectre/spectre_check.html (checker)

INFORMACIÓN CON APORTES (NO NOTICIAS):

[ESPAÑOL] 
https://blog.segu-info.com.ar/2018/01/vulnerabilidad-en-los-procesadores.html
https://blog.segu-info.com.ar/2018/01/meltdown-y-spectre-pesadilla-en-la.html 
http://www.elladodelmal.com/2018/01/el-caos-que-genera-metldown-spectre-con.html
https://www.welivesecurity.com/la-es/2018/01/05/vulnerabilidades-spectre-meltdown-todo-lo-que-necesitas-saber/ 
http://blog.elevenpaths.com/2018/01/internet-se-ha-roto-otra-vez-y-iii.html

[INGLÉS]
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html?m=1 
https://googleprojectzero.blogspot.com.ar/2018/01/reading-privileged-memory-with-side.html
https://www.anandtech.com/show/12214/understanding-meltdown-and-spectre
https://www.virusbulletin.com/blog/2018/01/meltdown-and-spectre-attacks-mitigated-operating-system-updates/
https://isc.sans.edu/diary/23197
https://www.renditioninfosec.com/2018/01/meltdown-and-sceptre-enterprise-action-plan/ 
https://www.wired.com/story/critical-intel-flaw-breaks-basic-security-for-most-computers/ 
http://appleinsider.com/articles/18/01/03/apple-has-already-partially-implemented-fix-in-macos-for-kpti-intel-cpu-security-flaw 
https://www.coindesk.com/meltdown-spectre-cpu-flaws-mean-cryptocurrency
https://nakedsecurity.sophos.com/2018/01/03/fckwit-aka-kaiser-aka-kpti-intel-cpu-flaw-needs-low-level-os-patches/?platform=hootsuite
https://medium.com/@pwnallthethings/time-travelling-exploits-with-meltdown-1189548f1e1d
https://medium.com/@sekuryti/meltdown-more-like-letdown-433926f8d743
http://www.securityweek.com/qualcomm-working-mitigations-spectre-meltdown 

LOS AFECTADOS DICEN...
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
http://www.amd.com/en/corporate/speculative-execution 
https://developer.arm.com/support/security-update/download-the-whitepaper
https://support.apple.com/en-us/HT208394
https://support.microsoft.com/en-hk/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
https://azure.microsoft.com/es-es/blog/securing-azure-customers-from-cpu-vulnerability/
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/

INFORMACIÓN EN CUENTAS DE TWITTER:
https://twitter.com/misc0110/status/948706387491786752
https://twitter.com/ssantosv 
https://twitter.com/gsuberland/status/948907452786933762
https://twitter.com/securelyfitz/status/949370010652196864

INFORMACIÓN DE CSIRTs:
https://www.ba-csirt.gob.ar/index.php?u=ver-noticia&id=174
https://www.us-cert.gov/ncas/alerts/TA18-004A

PARCHES/SOLUCIONES:
Firefox -> https://www.mozilla.org/en-US/firefox/57.0.4/releasenotes/
Microsoft -> https://www.catalog.update.microsoft.com/Search.aspx?q=KB4056892
Android -> https://source.android.com/security/bulletin/2018-01-01
Chrome -> https://www.chromium.org/Home/chromium-security/site-isolation
VMWare -> https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Linux -> https://github.com/IAIK/KAISER
https://github.com/torvalds/linux/commit/abb7099dbc7a77f8674083050028c493ac601228
ARM -> https://developer.arm.com/support/security-update
 

2 comentarios: