Microarchitectural Data Sampling

The Microarchitectural Data Sampling (MDS) vulnerabilities are a set of weaknesses in Intel x86 microprocessors that use hyper-threading, and leak data across protection boundaries that are architecturally supposed to be secure. The attacks exploiting the vulnerabilities have been labeled Fallout, RIDL (Rogue In-Flight Data Load), ZombieLoad., and ZombieLoad 2.

Microarchitectural Data Sampling
Logo designed for the vulnerabilities, featuring a wounded hand holding a broken microprocessor.
CVE identifier(s)CVE-2018-12126 (Fallout),
CVE-2018-12127 (RIDL),
CVE-2019-11091 (RIDL, ZombieLoad),
CVE-2018-12130 (RIDL, ZombieLoad),
CVE-2019-11135 (ZombieLoad v2)
Date discovered2018
Date patched14 May 2019
Discoverer University of Adelaide
Graz University of Technology
Catholic University of Leuven
Qihoo 360
Cyberus Technology
Saarland University
Vrije Universiteit Amsterdam
Bitdefender
Oracle Corporation
University of Michigan
Worcester Polytechnic Institute
Affected hardwarePre-April 2019 Intel x86 microprocessors
Websitemdsattacks.com ZombieLoadAttack.com
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.