Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. RAMBleed attack can steal sensitive data from computer memory

RAMBleed attack can steal sensitive data from computer memory

Scheduled Pinned Locked Moved The Insider News
comsysadminsecurityperformanceannouncement
5 Posts 5 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    Kent Sharkey
    wrote on last edited by
    #1

    Bleeping Computer[^]:

    Researchers found a new vulnerability that impacts the confidentiality of data stored in a computer's memory. Using it, they were successfully able to extract a signing key from an OpenSSH server using normal user privileges.

    That's it - no one gets to connect to any server any more

    J D M 3 Replies Last reply
    0
    • K Kent Sharkey

      Bleeping Computer[^]:

      Researchers found a new vulnerability that impacts the confidentiality of data stored in a computer's memory. Using it, they were successfully able to extract a signing key from an OpenSSH server using normal user privileges.

      That's it - no one gets to connect to any server any more

      J Offline
      J Offline
      Joe Woodbury
      wrote on last edited by
      #2

      I'm still really skeptical of these types of claims (including Meltdown and Spectre). These reports tend to be long on claims and short on details of their actual experimental setup. If I pointed them to a loaded up server actively running several processes and OpenSSH, would they be able to do what they claim to have done?

      1 Reply Last reply
      0
      • K Kent Sharkey

        Bleeping Computer[^]:

        Researchers found a new vulnerability that impacts the confidentiality of data stored in a computer's memory. Using it, they were successfully able to extract a signing key from an OpenSSH server using normal user privileges.

        That's it - no one gets to connect to any server any more

        D Offline
        D Offline
        Deflinek
        wrote on last edited by
        #3

        The success measured a rate of 0.3 bits per second and an accuracy of 82%. To obtain the full data, the researchers used a variant of the Heninger-Shacham algorithm that can recover RSA keys from partial information.

        A method to reduce the risk of this type of read-side attack is to flush encryption keys from memory immediately after using them. This lowers the chances of learning the secret data because RAMBleed needs it to stay in memory for at least one refresh interval, which is 64ms by default.

        I'm not saying that this vulnerability is not real but the article is a bit "click-baity" at least. Yes, they were able to read memory from out of process space, but if an attacker can get access to the server with enough knowledge of memory mapping and ability to run own programs in address space physically aligned to victim's for so long that 0.3 bits per second will hopefully get them enough portion of the key to figure out the rest… I would say there are definitely easier ways to compromise the server.

        -- "My software never has bugs. It just develops random features."

        R 1 Reply Last reply
        0
        • K Kent Sharkey

          Bleeping Computer[^]:

          Researchers found a new vulnerability that impacts the confidentiality of data stored in a computer's memory. Using it, they were successfully able to extract a signing key from an OpenSSH server using normal user privileges.

          That's it - no one gets to connect to any server any more

          M Offline
          M Offline
          maze3
          wrote on last edited by
          #4

          Where else are you going to steal my data from? The CPU, HA! (wispers: Specture) Oh.

          1 Reply Last reply
          0
          • D Deflinek

            The success measured a rate of 0.3 bits per second and an accuracy of 82%. To obtain the full data, the researchers used a variant of the Heninger-Shacham algorithm that can recover RSA keys from partial information.

            A method to reduce the risk of this type of read-side attack is to flush encryption keys from memory immediately after using them. This lowers the chances of learning the secret data because RAMBleed needs it to stay in memory for at least one refresh interval, which is 64ms by default.

            I'm not saying that this vulnerability is not real but the article is a bit "click-baity" at least. Yes, they were able to read memory from out of process space, but if an attacker can get access to the server with enough knowledge of memory mapping and ability to run own programs in address space physically aligned to victim's for so long that 0.3 bits per second will hopefully get them enough portion of the key to figure out the rest… I would say there are definitely easier ways to compromise the server.

            -- "My software never has bugs. It just develops random features."

            R Offline
            R Offline
            Rick York
            wrote on last edited by
            #5

            I agree. In my opinion, the worst part about these things is how they are responded to. The mitigation tactics slow the processor down measurably. I think it would be far better to improve front-end security and prevent malicious code from being launched in the first place.

            "They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"

            1 Reply Last reply
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Don't have an account? Register

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups