Skip Navigation

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

www.wired.com ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
7
7 comments
  • Did someone find the NSA's backdoor?

  • Now this is interesting. I have a feeling people who play games that use kernel-level anticheats, or use other third-party "security solutions" are going to be uniquely vulnerable to this. They tend to be highly insecure and have historically been vector for ring-0 privilege escalation.

    Besides that, it's also fairly easy to exploit old vulnerable kernel drivers to load unsigned code into the kernel with only administrator privileges (which itself is also fairly easy to escalate to from limited user permissions, on an insufficiently hardened Windows install). So this is actually pretty bad.

    After the CrowdStrike fiasco and now this, Microsoft will likely now be under even more pressure now to do something about the near free reign software vendors have had to the kernel.

    I don't know the exact situation for Linux but I could imagine it's probably not much better.

  • spongebob-i-fucking-love I love technology!

  • Hmm, So, with root access one can place arbitrary code in the firmware of the CPU, which can be accessed by the OS and ran. I wonder what if an infected computer has a root hack patched? Would it still be possible access the code in user space? Or is this effectively neutralized until the computer is reinfected by the attacker with something that gives root access.

    It's funny how often I read FUD articles in the news that basically sum up to be "hackers can spy on you if they have physical access to your computer". This is actually a big one and I hope it gets effectively patched ASAP. Especially for embedded devices.

  • well why'd you tell everyone, now somebody is going to try to exploit it!

    • It's normal white-hat practice. White hat hacker ethics require you to contact the company and give them lots of chances to fix it.

      But if they refuse to fix it or inform people of the vulnerability you broad-band it to the world because it's the only way to force the company's hand.

      It sounds like you basically need to have root access to the computer to take advantage of this. Like if someone can use this your system is already totally pwned. But, like, if a spy or something gets access to a machine they could load this and then it'd be in the system with no way to find it or dig it out.

You've viewed 7 comments.