{"id":241,"date":"2018-01-06T16:24:41","date_gmt":"2018-01-06T16:24:41","guid":{"rendered":"https:\/\/t3x.co.uk\/?p=241"},"modified":"2018-01-06T16:32:47","modified_gmt":"2018-01-06T16:32:47","slug":"what-are-meltdown-spectre","status":"publish","type":"post","link":"https:\/\/t3x.co.uk\/?p=241","title":{"rendered":"What are Meltdown\/Spectre?"},"content":{"rendered":"<p>You will have seen a lot in the news about these two threats to the devices that you use and \/ or manage.<\/p>\n<p>&#8216;Meltdown&#8217; and &#8216;Spectre&#8217; are two related, side-channel attacks against modern CPU microprocessors that can result in unprivileged code reading data it should not be able to.<\/p>\n<p><!--more--><\/p>\n<p>Most devices from smartphones to servers may be vulnerable. Intel, ARM and AMD have recognized the problem with thier processors, other processors may or may not be affected. Companies are working on patches to mitigate the issue.\u00a0 Here is the best advice:<\/p>\n<p><strong>Patch your devices as soon as possible<\/strong>.<\/p>\n<p>Processors in most devices employ a range of techniques to speed up their operation. The Meltdown and Spectre vulnerabilities allow some of these techniques to be abused, in order to obtain information about areas of memory not normally visible to an attacker. This could include other sensitive data. So as stated above patch your devices as soon as the patch comes out.\u00a0 Those of you with lots of servers \/ devices to look after should prioritize the ones with the most sensitive data.<\/p>\n<p>For the more technical these Common Vulnerabilities and Exposures (CVE) have been explained here on mitre.org :<\/p>\n<p>Spectre\u00a0(bounds check bypass and\u00a0branch target injection):<br \/>\n<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=2017-5753\">CVE-2017-5753<\/a>\u00a0and<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=2017-5715\">\u00a0CVE-2017-5715<\/a><\/p>\n<p>Meltdown\u00a0(rogue data cache load):\u00a0\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=2017-5754\">CVE-2017-5754<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You will have seen a lot in the news about these two threats to the devices that you use and \/ or manage. &#8216;Meltdown&#8217; and &#8216;Spectre&#8217; are two related, side-channel attacks against modern CPU microprocessors that can result in unprivileged code reading data it should not be able to.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[26,7,40],"tags":[43,45,41,42,44],"class_list":["post-241","post","type-post","status-publish","format-standard","hentry","category-browser","category-server","category-threats","tag-cve","tag-exposures","tag-meltdown","tag-spectre","tag-vulnerabilities"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3XT9c-3T","_links":{"self":[{"href":"https:\/\/t3x.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/t3x.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/t3x.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/t3x.co.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/t3x.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=241"}],"version-history":[{"count":7,"href":"https:\/\/t3x.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/241\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/t3x.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/241\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/t3x.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/t3x.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/t3x.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}