雨:利用旧漏洞从公有云中短暂泄露数据
Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities

原始链接: https://openreview.net/forum?id=4tDNvQe2G0

## 云安全漏洞摘要 研究人员展示了一种实际攻击,利用瞬态执行漏洞——特别是L1TF——在主要公共云平台上泄露虚拟机(VM)之间的*数据*。尽管这些漏洞已有缓解措施(如Spectre),但该攻击通过结合一个先前已知且“已缓解”的缺陷与简单的推测加载,成功绕过了它们。 这项研究挑战了软件防御措施足以应对的假设,尤其是在缺乏硬件修复的旧版CPU上。该攻击需要对目标系统(主机或客户机VM)的极少了解,并在15小时内成功从受害VM中泄露了TLS密钥,证明了其在真实世界的嘈杂云环境中的可行性。 这些发现强调了孤立地解决漏洞的危险性,而没有消除根本原因,因为攻击者可以将看似无害的缓解措施结合起来,从而创建强大的跨VM攻击。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 Rain:利用旧漏洞从公有云中瞬时泄露数据 (openreview.net) 5 分,smartbit 1小时前 | 隐藏 | 过去 | 收藏 | 1 条评论 smartbit 1小时前 [–] 论文描述了演示:现实世界中的Spectre:利用CPU漏洞从云端泄露您的私有数据 https://program.why2025.org/why2025/talk/DG7VSX/reply 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系 搜索:
相关文章

原文

Keywords: Cloud computing security; Hardware security; Systems security

TL;DR: Leaking memory across virtual machine boundaries at a public cloud provider, bypassing mitigations against these types of attacks.

Abstract: Given their vital importance for governments and enterprises around the world, we need to trust public clouds to provide strong security guarantees even in the face of advanced attacks and hardware vulnerabilities. While transient execution vulnerabilities, such as Spectre, have been in the spotlight since 2018, until now there have been no reports of realistic attacks on real-world clouds, leading to an assumption that such attacks are not practical in noisy real-world settings and without knowledge about the (host or guest) victim. In particular, given that today’s clouds have large fleets of older CPUs that lack comprehensive, in-silicon fixes to a variety of transient execution vulnerabilities, the question arises whether sufficient software-based defenses have been deployed to stop realistic attacks—especially those using older, supposedly mitigated vulnerabilities. In this paper, we answer this question in the negative. We show that the practice of mitigating vulnerabilities in isolation, without removing the root cause, leaves systems vulnerable. By combining such “mitigated” (and by themselves harmless) vulnerabilities, attackers may still craft an end-to-end attack that is more than the sum of its parts. In particular, we show that attackers can use L1TF, one of the oldest known transient execution vulnerabilities (discovered in January 2018), in combination with a simple speculative out-of-bounds load, to leak data from other guests in a commercial cloud computing platform. Moreover, with an average end-to-end duration of 15 hours to leak the TLS key of an Nginx server in a victim VM under noisy conditions, without detailed knowledge of either host or guest, the attack is realistic even in one of today’s biggest and most important commercial clouds.

Submission Number: 696

联系我们 contact @ memedata.com