"amdflaws.com" - What is this?

Page 11 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

CatMerc

Golden Member
Jul 16, 2016
1,114
1,153
136
https://techreport.com/news/33379/cts-labs-defends-its-public-disclosure-of-amd-vulnerabilities

The author then describes CTS' motivations to publish its findings immediately rather than providing ASMedia and AMD several weeks to work on fixing the problems. His primary argument is that public disclosure forces the vendor to begin work on mitigating the flaws immediately. Luk-Zilberman concludes the letter by saying that his group could have provided its proof-of-concept code to more than one party (in this case, Dan Guido from Trail of Bits) before making its claims public.

What he expects: "Alright guys we have 90 days to fix this. Let's just sit on our touchus for 80 days and smoke pot and then only fix a critical vulnerability in the remaining 10 days"
Reality: "We need to get it fixed as fast as possible so we can patch systems against this critical vulnerability and clearly explain the ins and outs so the public is informed and not panic over nothing"

All I see this doing in practice is create rushed out broken patches and public confusion. Which if your goal was stock manipulation - Great!
 

Markfw

Moderator Emeritus, Elite Member
May 16, 2002
27,014
15,957
136
https://techreport.com/news/33379/cts-labs-defends-its-public-disclosure-of-amd-vulnerabilities



What he expects: "Alright guys we have 90 days to fix this. Let's just sit on our touchus for 80 days and smoke pot and then only fix a critical vulnerability in the remaining 10 days"
Reality: "We need to get it fixed as fast as possible so we can patch systems against this critical vulnerability and clearly explain the ins and outs so the public is informed and not panic over nothing"

All I see this doing in practice is create rushed out broken patches and public confusion. Which if your goal was stock manipulation - Great!
Patches ? Like remove the ability to do bios updates ? and have microsoft revoke all admin rights, and only they can install any programs ?

This whole thing is a joke, a BAD joke, and not a problem, just a lot of BS.

You do know what ALL of these require either physical access to do a BIOS update, or admin privs.
 
Last edited:

DaveSimmons

Elite Member
Aug 12, 2001
40,730
670
126
CTS' behavior is not consistent with that of any reputable security researcher. There is no reason other than supporting the short-selling scam to provide the information to their paid collaborator a week early but not also to AMD.

Their reason is not credible. How can AMD not having the information for an extra week or more possibly speed up the creation of fixes? Answer: it can't, and no person without other motives like stock manipulation would think it could.
 

Mockingbird

Senior member
Feb 12, 2017
733
741
136
I'm surprised no one has done this before, particularly for a company with volatile stock like AMD you can't loose. I suspect we'll see more of this in the future, with more companies setup to give those who've found something like this a way to make a lot of money - you bring the exploit, they bring the money to invest and the stock market know-how. You both make money.

In 2016, security research firm MedSec found vulnerabilities in pacemakers made by St. Jude Medical. In what was likely a first, MedSec partnered with hedge fund Muddy Waters to bet against St. Jude Medical’s stock.
 

Mr Evil

Senior member
Jul 24, 2015
464
187
116
mrevil.asvachin.com
Synopsis:

"To violate these systems you first need to violate these systems"

Laughable.

And anyone saying that while the company is shady the threats might be real, really really really has no clue about this staff. The "vulnerability" is basically that superadmins have superadmin powers and that is a tool to do whatever they want. Exactly as it should be by design, or the role wouldn't exist.
As I wrote earlier in the thread, this could be a real issue for anyone using full-disc encryption with a TPM, e.g. BitLocker. The whole point of FDE is to prevent someone who has physical access to the system from reading data off it. A vulnerability in the PSP could allow the attacker to make the TPM just decrypt the drive unconditionally.

Of course it's not as serious as they are trying to make it appear; a remote exploint in the Intel ME was found not long ago that similarly allowed encyption to be bypassed, and it didn't cause as much drama as this has. Don't dismiss it entirely just because of the sleazy source though (assuming they didn't just make the whole thing up).
 

Jan Olšan

Senior member
Jan 12, 2017
522
1,035
136
CTS' behavior is not consistent with that of any reputable security researcher. There is no reason other than supporting the short-selling scam to provide the information to their paid collaborator a week early but not also to AMD.

Their reason is not credible. How can AMD not having the information for an extra week or more possibly speed up the creation of fixes? Answer: it can't, and no person without other motives like stock manipulation would think it could.

The main problem hardly anybody mentions is that those fraudsters are putting users and the public at risk.

It is highly unprofessional and at odds with principles that security research should follow. Their irresponsible publication puts users at risk and the fact that they held back the findings for months instead of reporting to vendor ASAP has prolonged the time that users will be left vulnerable by months.

And they even shared the findings with many parties that could have leaked to cyber criminals and other bad actors, BEFORE they reported the bugs to vendor. According to some sources, they even enforced NDAs with media so that they don't warn the vendor.

This security researcher (so-called...) has increased the risk to users significantly through their behaviour. Their professional community should condemn and stay away from such practices.
 

Markfw

Moderator Emeritus, Elite Member
May 16, 2002
27,014
15,957
136
The main problem hardly anybody mentions is that those fraudsters are putting users and the public at risk.

It is highly unprofessional and at odds with principles that security research should follow. Their irresponsible publication puts users at risk and the fact that they held back the findings for months instead of reporting to vendor ASAP has prolonged the time that users will be left vulnerable by months.

And they even shared the findings with many parties that could have leaked to cyber criminals and other bad actors, BEFORE they reported the bugs to vendor. According to some sources, they even enforced NDAs with media so that they don't warn the vendor.

This security researcher (so-called...) has increased the risk to users significantly through their behaviour. Their professional community should condemn and stay away from such practices.
I don't see how anyone is at risk right now. These so-called "flaws" require admin privileges to implement, which makes them not "flaws" at all. Any admin EVER could always do this.
 

Stuka87

Diamond Member
Dec 10, 2010
6,240
2,559
136
The main problem hardly anybody mentions is that those fraudsters are putting users and the public at risk.

It is highly unprofessional and at odds with principles that security research should follow. Their irresponsible publication puts users at risk and the fact that they held back the findings for months instead of reporting to vendor ASAP has prolonged the time that users will be left vulnerable by months.

And they even shared the findings with many parties that could have leaked to cyber criminals and other bad actors, BEFORE they reported the bugs to vendor. According to some sources, they even enforced NDAs with media so that they don't warn the vendor.

This security researcher (so-called...) has increased the risk to users significantly through their behaviour. Their professional community should condemn and stay away from such practices.

The way they released this "data" is certainly in poor taste, and against all known security protocols.

However, their flaws are not real flaws IMO. If an attack requires the attacker to have source code and certs in order to impersonate a company and then install compromised drivers/firmware, plus admin privs on the machine they are attacking, its NOT a flaw.
 

Panino Manino

Golden Member
Jan 28, 2017
1,080
1,312
136
Good and all if they found something, but now it's even more clear that what they did was criminal.
It pains me imagining "the press" insisting on giving those bandits audience (and profit's).
"See, the vulnerabilities were true after all, we were not wrong about giving CTS the 'benefit of the doubt'".
 

urvile

Golden Member
Aug 3, 2017
1,575
474
96

Oh. That's surprising.

I think this morning before I go to work. I am going to write a white paper claiming I found a security flaw in my microwave ovens firmware. That will allow an attacker to change the heat setting without a users knowledge and burn their food.

CTS Labs and viceroy are making some very big claims without providing any evidence. Everyone is still taking a wait and see approach though.
 

IRobot23

Senior member
Jul 3, 2017
601
183
76
I am still asking myself same question... why would anyone do site/company only to investigate one lineup of processors on the market? I mean literally they investigated single die.

If you want to help security of processors on the this planet, you will look only one lineup? Amazing.
 

urvile

Golden Member
Aug 3, 2017
1,575
474
96
You can all see how the hype train works though. Right? Do you wonder after spectre etc. how many established and reputable researchers have been testing other CPU architectures to see if they are vulnerable to exploits?

The whole thing is bizarre hopefully there are no vulnerabilities but who knows? That's the beauty of it.
 

Hitman928

Diamond Member
Apr 15, 2012
6,626
12,167
136
So have we seen proof of concept exploits yet?

A select few (none are independent from what I've seen) have said that they've seen the PoCs and that they work as described in the technical report (different than the publicly released white paper). What the PoCs actually do or what the technical report says and how it may be different than what is described in the white paper is still a big unknown.

According to the "researchers", we won't see PoC or technical report until all the vulnerabilities are fixed, because they are concerned about public safety .
 

urvile

Golden Member
Aug 3, 2017
1,575
474
96
A select few (non are independent from what I've seen) have said that they've seen the PoCs and that they work as described in the technical report (different than the publicly released white paper). What the PoCs actually do or what the technical report says and how it may be different than what is described in the white paper is still a big unknown.

According to the "researchers", we won't see PoC or technical report until all the vulnerabilities are fixed, because they are concerned about public safety .

People saying they have seen the exploits means nothing. That's the thing. The caveat on that though would be if it was a highly reputable researcher or one of the companies that CTS labs claim they have sent their research too. Publicly confirms they have received the POC exploits*. Otherwise it's BS. Just my opinion of course. I am certainly no expert in this field**.

*Although those companies haven't denied it either. Or have they?

**I did once read an article called smashing the stack for fun and profit by aleph one. When I was at university. It's a bit dated now though but hey.
 
Last edited:

Schmide

Diamond Member
Mar 7, 2002
5,689
923
126
I've been trying to wrap my head around this for a couple days. To me this just seems like a first man in line attack.

The PSP is in charge of provisioning environments. If I'm first in line, I set up the first environment as everything including the request vector for any future requests. To them the new boss looks exactly the same as the old boss.
 

Kenmitch

Diamond Member
Oct 10, 1999
8,505
2,250
136
Oh. That's surprising.

I think this morning before I go to work. I am going to write a white paper claiming I found a security flaw in my microwave ovens firmware. That will allow an attacker to change the heat setting without a users knowledge and burn their food.

CTS Labs and viceroy are making some very big claims without providing any evidence. Everyone is still taking a wait and see approach though.

If I could spel and use corect gramoar I'd make one two.

My idea involes self drive kars and smash up derby
 

urvile

Golden Member
Aug 3, 2017
1,575
474
96
You can't type that drunk....Takes skill and concentration to defeat auto correct.

Ah. Well you should drink. It makes anandtech more readable. When I was at university. I had an academic supervisor for my final year project and I used to drive him nuts with my grammar (or lack thereof). He once told me in an almost horrified way that I can't start a sentence with a conjunction and I was like what's a conjunction?

I do know computer security though (phrack is still good) and BS when I see it. Maybe it's not BS though? Who can say? It's good isn't it?
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |