Intel CPU΢¼Ü¹¹Êý¾Ý²ÉÑù(MDS)Îó²î

Ðû²¼Ê±¼ä 2019-05-15
¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



Åä¾°ÐÎò



5ÔÂ14ÈÕIntelÅû¶ÆäCPUоƬÖеÄ΢¼Ü¹¹Êý¾Ý²ÉÑù(MDS)Îó²î£¬£¬£¬£¬£¬£¬£¬Õâ×éÎó²îÊÇÏÈǰÅû¶µÄÍÆ²âÖ´ÐвàͨµÀÎó²îµÄ×ÓÀ࣬£¬£¬£¬£¬£¬£¬ÓÉËÄÖÖÏà¹ØÊÖÒÕ×é³É¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁË2011ÄêÀ´µÄÏÕЩËùÓÐIntel CPU¡£¡£¡£¡£¡£¡£IntelÒÑÏò×°±¸ºÍÖ÷°å³§ÉÌÐû²¼ÁËÓÃÓÚÐÞ¸´Îó²îµÄCPU΢Âë¸üС£¡£¡£¡£¡£¡£



Îó²îÁбí



CVE ID  £º   CVE-2018-12126    
Îó²îÆ·¼¶£º   ÖÐΣ
Îó²îÃû³Æ£º   Î¢¼Ü¹¹´æ´¢»º³åÇøÊý¾Ý²ÉÑù£¨MSBDS£©£¬£¬£¬£¬£¬£¬£¬Ò²±»³ÆÎªFallout¹¥»÷
CVSSÆÀ·Ö£º   6.5

CVE ID  £º   CVE-2018-12127    
Îó²îÆ·¼¶£º   ÖÐΣ
Îó²îÃû³Æ£º   Î¢¼Ü¹¹¸ºÔض˿ÚÊý¾Ý²ÉÑù£¨MLPDS£©£¬£¬£¬£¬£¬£¬£¬Ò²±»³ÆÎªZombieload»òRIDL¹¥»÷
CVSSÆÀ·Ö£º   6.5

CVE ID  £º   CVE-2018-12130    
Îó²îÆ·¼¶£º   ÖÐΣ
Îó²îÃû³Æ£º   Î¢¼Ü¹¹Ìî³ä»º³åÇøÊý¾Ý²ÉÑù£¨MFBDS£©£¬£¬£¬£¬£¬£¬£¬RIDLÀ๥»÷
CVSSÆÀ·Ö£º   6.5

CVE ID  £º   CVE-2019-11091    
Îó²îÆ·¼¶£º   µÍΣ
Îó²îÃû³Æ£º  ΢¼Ü¹¹²»¿É»º´æÄÚ´æÊý¾Ý²ÉÑù£¨MDSUM£©£¬£¬£¬£¬£¬£¬£¬RIDLÀ๥»÷
CVSSÆÀ·Ö£º   3.8


Îó²îÏêÇé



ͨ¹ýʹÓÃIntel CPU΢¼Ü¹¹ÖеÄÍÆ²âÖ´ÐвÙ×÷£¬£¬£¬£¬£¬£¬£¬MDS¹¥»÷¿ÉÔÊÐí¹¥»÷Õß»á¼ûÆäËü³ÌÐòÔÚCPUÖд¦Öóͷ£µÄÊý¾Ý¡£¡£¡£¡£¡£¡£×Ô2011ÄêÒÔÀ´µÄIntel CPUÏÕЩ¶¼ÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬°üÀ¨Ì¨Ê½»ú¡¢Ìõ¼Ç±¾¼°Ð§ÀÍÆ÷µÄ´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¡£IntelÌåÏÖÆä×îвúÆ·¿É´ÓÓ²¼þ²ãÃæ½â¾öÕâЩÎÊÌ⣬£¬£¬£¬£¬£¬£¬°üÀ¨µÚ8´úºÍµÚ9´úCore´¦Öóͷ£Æ÷¼°µÚ¶þ´úXeon Scalable´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¡£¹ØÓÚÆäËûÊÜÓ°ÏìµÄ²úÆ·£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ý΢´úÂë¸üлñµÃ»º½â¡£¡£¡£¡£¡£¡£


Ó¢ÌØ¶û»¹ÌåÏÖ¶Ô´ó´ó¶¼PC¶øÑÔ£¬£¬£¬£¬£¬£¬£¬»º½â²½·¥¶ÔÐÔÄÜÓ°Ïì²»´ó£¬£¬£¬£¬£¬£¬£¬µ«¶ÔÊý¾ÝÖÐÐĸºÔضøÑÔ£¬£¬£¬£¬£¬£¬£¬ÐÔÄÜ¿ÉÄܱ£´æÏ½µ¡£¡£¡£¡£¡£¡£


ARMºÍAMD´¦Öóͷ£Æ÷ËÆºõûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£


Ñо¿Ö°Ô±ÔÚGithubÉÏÐû²¼ÁËÏà¹ØPoC¡£¡£¡£¡£¡£¡£Á´½ÓΪ£ºhttps://github.com/IAIK/ZombieLoad

ÊÜÓ°Ïì²úÆ·µÄÍêÕûÁбí¿É²Î¿¼ÒÔÏÂÎļþ£º
https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


ÐÞ¸´½¨Òé



΢Èí
MicrosoftÒÑÐû²¼²Ù×÷ϵͳ¼¶¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔ½â¾öËĸöMDSÎó²î¡£¡£¡£¡£¡£¡£Æ¾Ö¤MicrosoftµÄMDSÇå¾²½¨Ò飬£¬£¬£¬£¬£¬£¬²Ù×÷ϵͳ¸üпÉÓÃÓÚWindowsºÍWindows Server£¬£¬£¬£¬£¬£¬£¬Ò²¿ÉÓÃÓÚSQL ServerÊý¾Ý¿â¡£¡£¡£¡£¡£¡£Azure¿Í»§¶ËÒÑÊܵ½±£»£»£» £»¤£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚMicrosoftÒѽÓÄɲ½·¥ÐÞ²¹ÆäÔÆ»ù´¡¼Ü¹¹²¢¼õÇáÍþв¡£¡£¡£¡£¡£¡£

Apple
Æ»¹û½ñÌìÐû²¼µÄmacOS Mojave 10.14.5ÒѾ­°²ÅÅÁ˶ÔMDS¹¥»÷µÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£iOS×°±¸²»Ò×Êܵ½MDS¹¥»÷£¬£¬£¬£¬£¬£¬£¬Òò´ËÏÖÔÚ²»ÐèÒªÌØÊâµÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£

Linux
Ë鯬»¯µÄLINUXÉú̬ϵͳÐû²¼²¹¶¡µÄËÙÂÊ»ºÂý¡£¡£¡£¡£¡£¡£ÔÚ׫д±¾ÎÄʱ£¬£¬£¬£¬£¬£¬£¬Ö»ÓÐRed HatºÍUbuntuÐû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£

Google
¹È¸è½ñÌìÐû²¼ÁËÒ»¸ö×ÊÖúÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬ÁгöÁËÿÖÖ²úÆ·µÄ״̬ÒÔ¼°ËüÔõÑùÊܵ½DS¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£Æ¾Ö¤´ËÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬¹È¸èµÄÔÆ»ù´¡¼Ü¹¹ÒѾ­»ñµÃÁËÊʵ±µÄ±£»£»£» £»¤¡£¡£¡£¡£¡£¡£Ä³Ð©Google Cloud Platform¿Í»§¿ÉÄÜÐèÒªÉó²éijЩÉèÖ㬣¬£¬£¬£¬£¬£¬µ«G SuiteºÍGoogle Apps¿Í»§ÎÞÐèÖ´ÐÐÈκβÙ×÷¡£¡£¡£¡£¡£¡£Chrome²Ù×÷ϵͳÒÑÍ£ÓÃChrome OS 74¼°ºóÐø°æ±¾µÄ³¬Ï̹߳¦Ð§¡£¡£¡£¡£¡£¡£¹È¸èÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Õâ¿ÉÒÔ±ÜÃâMDS¹¥»÷¡£¡£¡£¡£¡£¡£AndroidÓû§²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¹È¸èÌåÏÖ£¬£¬£¬£¬£¬£¬£¬²Ù×÷ϵͳ¼¶±ðµÄ»º½â²½·¥Ó¦Äܱ£»£»£» £»¤Chromeä¯ÀÀÆ÷Óû§¡£¡£¡£¡£¡£¡£

Amazon
ÀàËÆÓڹȸèºÍ΢Èí£¬£¬£¬£¬£¬£¬£¬ÑÇÂíÑ·ÌåÏÖÒѾ­ÔÚÔÆÐ§ÀÍÆ÷ÉÏÐÞ²¹²¢Ó¦Óûº½â²½·¥¡£¡£¡£¡£¡£¡£


²Î¿¼Á´½Ó



https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/