Meltdown and Spectre: CPU vulnerabilities patched

kemical

Windows Forum Admin
Staff member
Premium Supporter
Joined
Aug 28, 2007
Location
Room 237
New vulnerabilities have recently been discovered with modern cpu's:

It would seem Intel are more prone to attack than AMD:

Meltdown and Spectre

Microsoft have released patches which will be available via Windows update. If like me yours hasn't arrived then download the standalone version here:

Windows 10:
https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892

Windows 8.1:
https://support.microsoft.com/en-us/help/4056898/windows-81-update-kb4056898

Windows 7:
https://support.microsoft.com/en-us/help/4056897/windows-7-update-kb4056897

(To access the standalone download, scroll down the changelog to 'How to get this update' and click the link)
 
This one is going to suck and I'm not even talking about the security ramifications. Performance is going to be heavily impacted especially for virtual environments. I read as much as a 30% decrease in virtual environments.
 
Hmm... I wonder if it's a sneaky way of getting everyone to buy new 'bug free' chips when made available??
 
Process to verify your system is properly patched.
Patching requires both a patch from Microsoft and a firmware update from your system or motherboard manufacturer (for self built)

  • Open an elevated powershell prompt (Right click, 'Run As Administrator')
  • Type Install-Module SpeculationControl
  • Press A to install all/any modules
  • Type Get-SpeculationControlSettings
If you have any red you are not fully patched. CVE-2017-5754 is the OS patch and CVE-2017-5715 is handled by the firmware update covering install. There is a third CVE which may also be present. As a side note not all vendors have a firmware patch avaliable yet.
 
CVEs

Protection Guide
https://support.microsoft.com/en-us...-to-protect-against-the-speculative-execution

Advisory Article
ADV180002 | Guidance to mitigate speculative execution side-channel vulnerabilities


So when the patch is applied you also need to enable these registry keys to enable the mitigations
To enable the mitigations

You can run the two following reg add commands from an elevated command prompt
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0 /f

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f


***UPDATE***
This is mentioned in the advisory, but you will also want to verify your A/V A/M is compatible with the MS patch. Some security products call undocumented Windows functions. If you don't have a compatible security suite you will likely encounter BSODs as a result.

***UPDATE 2***
Current compatiblity list
CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754 (Meltdown and Spectre) Windows antivirus patch compatibility
 
Last edited:
Massive Chip Flaw Explained In 3 Minutes

Also

Meltdown and Spectre: ‘worst ever’ CPU bugs affect virtually all computers (infowars)
Meltdown and Spectre: ‘worst ever’ CPU bugs affect virtually all computers (London Guardian)


Apparently, and Intels CEO has been mum, but this has been known for 2 months already and just now getting out. I heard class action suits exploding against Intel because they KNEW about this flaw and it was part of the design on purpose to allow the US government to access our systems at will.

I have heard this flaw issue has been patched by Microsoft already. But we will see how this pans out. This flaw appears to have been there forever
 
my question: Since Intel knew about the flaw, it was purposely created how can Intel stand there with a straight face and say they will detail the flaw... that's like asking someone to say how they cut the brake lines so to speak. Well, we'll act stupid and say this and that, but we designed these chips this was since 1995. about when the x86 market was warming up
 
@kemical Yeah, I saw that. MSFT was probably the first one. But this is damaging because it has been reported, it is a flaw they have known about for many years, theory is that it started in 1995.

This is huge. Now if this was a backdoor to monitor our systems, which is a huge accusation/allegation, Intel will have to close that issue the next generation of CPU's. I see no other way around this. can't keep producing CPU's with a flaw created on purpose.
 
infowars are a source, a more untrustworthy site I've yet to find. Simply there are three variants. Intel suffer from all, AMD from variant 2 which is also the most difficult to patch, its also only of use if you have local access and really know what you're doing.
 
I understand you personal feelings on this. But the crux of my entire post is that, this is a problem, regardless of news source. But the fact that it has been a problem that was confronted a couple months ago, a problem that has been a purposely made flaw.

disregard the source. Look at the story. What gets me is, its appearing that this has been a well known but a silence on the part of Intel,AMD and Atom surely signify a massive issue.

Now by simple mathematics, not in anyway to insult your intelligence, But it would seem that these flaws are on 3 different platforms, each affected by either one or more variants. Now fairly current word is, these flaws were well known and now coming to light. And these flaws date back to 1995 so Windows 95 era. this is a flaw, that is 22 years old. So with this logic in a big picture view, the chip makers knew of it. This is why there's apparently a class action against Intel and the CEO was mute until recently. but tomorrow (9th) Intel will supposedly address the flaw.

My theory?
I honestly think it was meant for government access to our systems. think about it a second, We have this 22 year old flaw, what we now know was known all along. Mesh with that, the wikileaks reports on CIA tools to spy on the peoples PC's. Think CIA level tools that Assange and I think guccifer 2.0 found.

I'm not a conspiracy theorist, but too many unanswered question at this point but too many things in the light not to form a general conclusion as such.
 
Well speculative execution is technically a feature, but can also be a vulnerability as denoted by these CVEs. My bet is Intel didn't want to address it because it's presently about the only performance advantage they have (HAD) over AMD.
 
EPIC the gaming company patched their Fortnite servers and performance has tanked. Isn't looking good for Intel.
 
Guess there will be a transition to epyc from AMD soon then. Having an AMD myself feel a little on the smug side
 
Well it's really bad for intel but for AMD it's so hard to exploit no ones going to bother. The Intel flaws are easily leveraged and automated. Spectre on AMD really isn't. You need local access and actually have to know what you're doing as it can't be automated. So still feeling a tad smug.