Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

What do you mean by “no known exploits”? There are several PoCs out, one of which is in JavaScript for meltdown.


sort by: page size:

To my knowledge there are currently no known exploits. It's more a matter of risk management: newer codebases are less secure because we had less time to find bugs and spread best practices. That problem is amplified for larger codebases (but diminished by a more active developer community).

Here's a JS speculative read example straight from the original meltdown paper turned into a PoC checker: https://terjanq.github.io/meltdown-checker/app.js I accept PayPal ;-)

(Of course this depend on your definition of a "real world exploit", but this does show that you can cross boundaries of a type system.)


I haven't seen any POC exploits at all yet. Will be looking around this weekend.

Despite it sounding like a terrible idea, I haven't heard of any exploits.

Trivial, yet nobody has managed to produce a working exploit that doesn't require a running start. The poc exploits wouldn't work in the wild. They are running with interference of a real system.

Also, meltdown requires the data to be snooped to be in L1D cache. So the current demo exploit has to keep pushing the data into cache to be read.

Something simple like steal a password from sudo should be trivia right? I'd not convinced i need to worry.

And making non public facing machines pay the price of the mitigation seems like too much.


The person you are responding to is specifically talking about looking for exploits that are hidden behind compiler bugs or obfuscated by language features. So you're missing the point, I guess.

so they're used in combination with already known exploits but you're saying no one uses them during the development of exploits?

How do you hack something without discovering a vulnerability? Assuming that there are no known vulnerabilities.

Common Vulnerabilities and Exposures, essentially no unpatched holes allowed.

A single incident doesn't really demonstrate that it's "open to exploits"; it just demonstrates that it's possible, but no system is 100% foolproof so that's not really meaningful.

I can only recall two incidents: the other being the JS event-stream cryptothing and that was five years ago. Perhaps there are others I'm not aware of, but by and large, it seems very rare that projects that see real-world usage get compromised.

(and don't give me any of that "but we don't know how often it happens!"-bollocks – you can always say that about almost anything; go find evidence).


So that's not a single exploit away then

What else can you say?

It's impossible to know if a vulnerability was exploited.


What about exploits like bugs in compression algorithms or Javascript (with speculative execution)?

Is there any evidence this is exploitable? I see none.

Because they mostly don't matter. Where is a practical, real world exploit? (This means not POC that works under perfect conditions.)

Interesting. I independently dreamt up this class of vulnerability in 2007 or so. I didn't know there were any instances of it in the wild. When I realized it ought to be possible, I just wrote a PoC vulnerable app and an exploit for it, and then sort of forgot about it. Cool to see it's a real thing now.

Someone needs to publish an exploit, how come I have never seen a single one yet

Which wouldn't change the fact that there might be exploits nested in the code

I don't know about exploits; it is a common trick used by pentesters.

I recall being at Defcon in the 90s listening to the cDc folks talking about this.

next

Legal | privacy