• Patch Lady – light reading for the evening

    Home » Forums » Newsletter and Homepage topics » Patch Lady – light reading for the evening

    Author
    Topic
    #197734

    For those of you that like to dig a bit deeper into the details of patching, I highly recommend the Zero Day blog.  For those who remember the detaile
    [See the full post at: Patch Lady – light reading for the evening]

    Susan Bradley Patch Lady/Prudent patcher

    10 users thanked author for this post.
    Viewing 9 reply threads
    Author
    Replies
    • #197736

      Here’s the Status of Meltdown and Spectre Mitigations in Windows

      By Catalin Cimpanu | June 13, 2018

       
      Yesterday’s Patch Tuesday release included fixes for the latest Spectre vulnerability, known as Spectre variant 4, or SpectreNG.

      These patches are currently not available for all Windows versions, though, and all mitigations are disabled by default.

      Only Windows 10, Windows Server 2016, Windows 7, and Windows Server 2008 R2 have received SpectreNG patches.

      Meltdown and Spectre patching is a mess

       
      Read the full article here

      5 users thanked author for this post.
    • #197737

      Just hot off the presses tonight we have another Intel vulnerability that will make our heads hurt trying to figure out the patches on. Called Lazy FP State restore vulnerability

      See details on Code Red – Security Advisories:
      Intel Releases Security Advisory on Lazy FP State Restore Vulnerability: US-CERT

      4 users thanked author for this post.
    • #197741

      Had Win7 64 bit system with appropriate Intel Microcode Updates and FULLY WORKING Meltdown and Spectre mitigations per Gibson’s Inspectre BEFORE installing Win7 Security Only Update KB4284867.

      After installing KB4284867 any and all Spectre mitigations are completely disabled per Gibson’s Inspectre.  Inspectre actually acts exactly like it does when the appropriate Spectre enabling Intel Microcodes are not installed at all after the KB4284867 install.

      Setting registry “FeatureSettingsOverride” to 0 or 8 makes no difference in result after KB4284867 install where either would work before KB4284867 install (just gotta love bitmaps). The only way to restore Spectre mitigations to working status is uninstall KB4284867.

      This could be a bug in the Gibson’s Inspectre in combo with the June Windows updates but I doubt it cause after you install KB4284867 it’s like the Microcode Updates needed to enable Spectre mitigation are no longer installed when they if fact are.

      I tried to find the old PowerShell test routines to try them and couldn’t BUT I also couldn’t get them to work at all before either.

    • #197742

      We have had a peak into the State Hacker’s toolkit lately IMHO

      Unless you operate a sensitive server, you probably have nothing to worry about. Although ii is a good reality check to tighten up defenses.

      Not logging on as a admin, disabling 3rd party cookies and not running Javascript by default are good places to start.

      For me I probably won’t be installing any microcode bios updates. YMMV

      2 users thanked author for this post.
      • #197796

        As always, there’s a balance to be struck between security and stability, and whilst the balance clearly leans towards security where Windows updates are concerned, subject to the usual caution exercised here as opposed to rushing into installing them, it seems to me that the balance still leans more towards performance where certainly BIOS updates and arguably driver updates are concerned. BIOS updates really can do serious damage to a system, with little in the way of advance feedback because there are so many different systems (and sites like this tend not to talk about them enough), and I’m always reluctant to update drivers that are working flawlessly.

        A lot depends on the use you put your computers to, and the severity of loss if any compromise were to happen. My approach to security starts with having nothing whatsoever to do with online or telephone banking, or investment/pension management. I use one credit card for online purchases, and monitor my statements very carefully. As a home-based gamer, for me performance is important, but people who manage all their finances (and/or their businesses) online may feel they need to err more towards security than performance, which would be perfectly understandable.

        2 users thanked author for this post.
    • #197750

      We have had a peak into the State Hacker’s toolkit lately IMHO Unless you operate a sensitive server, you probably have nothing to worry about. Although ii is a good reality check to tighten up defenses. Not logging on as a admin, disabling 3rd party cookies and not running Javascript by default are good places to start. For me I probably won’t be installing any microcode bios updates. YMMV

      Right now that is most certainly true but you can not blindly bank that it will stay that way.  The Spectre Pandora’s Box is just starting to open and it’s to good a target not to get exploited somewhere how down the road.

      1 user thanked author for this post.
    • #197773

      For those of you that like to dig a bit deeper into the details of patching, I highly recommend the Zero Day blog. For those who remember the detaile[See the full post at: Patch Lady – light reading for the evening]

      Microsoft gives the advice in “https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012”  : =>>
      4.4. Evaluate the Speculative Store Bypass risk to your environment, including CVSS value and exposure to vulnerable code patterns in third-party software, and decide if SSBD should be turned on.

      PLEASE: is there anyone who cal tell me how to “”Evaluate the Speculative Store Bypass risk to your environment””  ??

      much obliged if you will pass the knowledge
      regards, Fred

      * _ ... _ *
      • #197812

        Planning another post on exactly that topic!

        Susan Bradley Patch Lady/Prudent patcher

        2 users thanked author for this post.
        • #198411

          Planning another post on exactly that topic!

          Hi, was hoping to find your article…. can you guide me, please?

          much obliged, fred

          * _ ... _ *
    • #197780

      I would say there would need to be a fair deal of sophistication for hackers to exploit a system using Spectre exploits.

      While this is entirely possible there are probably many easier ways Hackers can gain access to systems.

      The way I see it is that Spectre can be used to infiltrate systems without detection and that sophistication has not been the trademark of normal hackers.

      If this does become an issue going forward then revaluation would be required. I would be surprised if 50% of at risk systems would get effective protection.

      1 user thanked author for this post.
    • #197840

      More kernel fixes again for everybody?, AMD users can keep checking their security updates page for more information.

    • #198202

      So in case anyone is wondering, it is a bad idea to enable the Lazy FP State Restore patches inside Server 2012R2 HyperV virtual machines on a host with no microcode update. I am not sure which part of that causes the problem, but it puts you in a bad spot:
      Server-2012R2-BSOD-IRQL_NOT_LESS_OR_EQUAL

      This is the exact group policy I applied, which I believe matches Microsoft’s recommendations to enable the patch for CVE-2018-3639:
      Group-Policy-of-Death
      Essentially, set HKLMSYSTEMCurrentControlSetControlSession ManagerMemory ManagementFeatureSettingsOverride to 8, and FeatureSettingsOverrideMask to 3.

      This resulted in a BSOD on startup for ALL of my virtual machines with this policy applied. Fixing this was annoying, since the VMs wouldn’t boot. You have to use the recovery environment, load the SYSTEM hive, and remove the keys.

      So if you have the same setup as me (no microcode update on the HyperV host), don’t enable the fix! Hopefully this was obvious to everyone and I was just spacing out on a Friday, but just in case, this is fair warning.

      1 user thanked author for this post.
    • #198543

      Susan…when you mention testing your PC’s, could you please indicate whether they are Win7 or Win10?

      Thanks

    Viewing 9 reply threads
    Reply To: Patch Lady – light reading for the evening

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: