Nos hacemos eco de RAMBleed, un nuevo ataque que es
capaz de leer y robar datos almacenados en la memoria RAM de un equipo.
Para ello utilizan una vulnerabilidad existente, concretamente de
Rowhammer. Es así como se llama a un proceso de aislamiento de la
información que se almacena en la RAM. En esta ocasión no modifica la
información, sino que únicamente la lee. #RAMBleed
0 115 July, 2019
Please Turn On Your Post Notification So You Would Not Miss Out Contents
RAMBleed Exploit Inflicts Rowhammer-Style Attack On Private Data From PC Memory
Sometimes it feels as though nary a day goes by without someone sounding the alarm on a new security vulnerability. More recently, there has been a lot of hoopla over side-channel exploits, such as Spectre and Meltdown, and various other variants. Here is another one to add to your mental catalog of exploits—RAMBleed. A team of researchers has given the name RAMBleed to yet another new side-channel attack based on Rowhammer, which itself is a set of vulnerabilities that allows unprivileged attackers to exploit design flaws in DRAM and memory cards. Around this same time last year, a Rowhammer-style exploit called RAMpage reared its ugly head on Android phones.
Now security researchers from the University of Michigan, Graz University of Technology, and University of Adelaide are talking about RAMBleed. In short, RAMBleed makes it possible for an attacker to read the contents of DRAM on a Windows PC, and do so without directly accessing the memory. "Previous attacks exploited the Rowhammer effect to write (or flip) bits in the victim's memory. RAMBleed is different in that it uses Rowhammer for reading data stored inside the computer's physical memory. As the physical memory is shared among all process in the system, this puts all processes at risk," the researchers explain.
The researchers say that RAMBleed can potentially read any data stored in memory, though in practice, what can be read depends on the victim program's memory access programs. As a proof-of-concept, the researchers leveraged RAMBleed to read an OpenSSH 7.9 RSA key.
RAMBleed Attack: Flip bits to steal sensitive data from computer memory
A team of #cybersecurity researchers revealed details of a new side-channel #attack on dynamic random-access memory #DRAM that could allow malicious programs to read sensitive memory data from other processes running on the same #hardware . Dubbed #RAMBleed and identified as CVE-2019-0174, the new attack is based on a well-known class of DRAM side channel attack called #Rowhammer .