Vulnerability of Intel 64-bit CPU corrected by the developers of operating systems
Last week we discovered a vulnerability in the implementation of x86-64 microprocessors Intel Pentium 4 and above , which could allow an attacker to take control of the operating system (only 64-bit OS) accessed from a virtual machine.
This vulnerability is a variant originated by intel instruction set AMD-64 in its microprocessors, which when accessed from a virtual machine by using the memory addresses SYSRET “real” than the 48 bits, causes an error , which allows execution of code in the address space “kernel”, allowing gain control of the host operating system.
This error does not occur in AMD microprocessors, the microprocessor then denied any access to memory addresses “real” than the 48 bits, which are handled as copies of the address bit 48 (47 if we start the count from zero), canonical form known as routing addresses.
The good news is that holders of Intel microprocessors will no longer have to worry about this problem, which has been fixed by patches on most 64-bit operating systems, including Windows family of operating systems from Microsoft, and other companies such as Citrix, FreeBSD, NetBSD, Oracle, SUSE, Xen, Red Hat and Joyent have already released patches that prevent attackers from taking advantage of this vulnerability in Intel microprocessors, it would have been very difficult for manufacturers of old motherboards update their products with new micro-codes in new BIOS for them.
Link: Critical security bug fixed in Intel chips (Hardware.Info)Tags: 64 bits, addressing, bug, canonical, corrected, CPU, EMT64, form addresses, intel, Patch, SYSRET, vulnerability, x86-64