On the eve of X-Point super dense memory – a potentially massive exploit using DRAM memory.

Just on the eve of X-Point super dense memory; a breakthrough in memory architecture covered (see article here) – researchers have found a potentially massive exploit that uses dense memory to gain access.

This exploit is triggered by specially crafted memory access patterns that rapidly activate the same memory rows numerous times which circumvents the DRAM memory cells isolation – allowing for malicious and undesired outcomes like privilege escalation.

Row Hammer Explanation - By Eurosfot
Row Hammer Explanation & Protection – By Eurosfot

(Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.)

Currently the most effective way of protecting from this type of attach is to stable Javascript on your browser using a plug-in like NoScript, but this will make many webpages not function correctly as much of the web’s interactivity relies of javascript.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s