May 16, 2005 10:08 AM PDT

Pentium 4 loophole could let in hackers

Intel is acting to calm fears that technology in its Pentium 4 processors will enable hackers to steal passwords by reading "footprints" in the cache.

Hyperthreading, introduced in Intel's Pentium 4, could allow hackers to access secure information, according to Colin Percival, a 23-year-old Ph.D. student from Vancouver, British Columbia. The technology makes software run faster by letting two threads run on the same processor at the same time.

The attack, revealed Friday in a paper delivered at the BSDCan conference in Ottawa, relies on a spy process installed on the server and sharing the L2 cache with an OpenSSL cryptographic process. The spy process observes the time taken for certain cache operations and deduces what the other process is doing (which Percival refers to as "footprints in the cache"), gathering information that could help crack the desired password.

Intel, which was informed of the problem in March, said the risk is very low. It only works on a server that has already been compromised to allow a malicious hacker to install a spy process. If the hacker has already achieved this, there are many easier and quicker ways to steal data, Intel spokesman Howard High said.

The attack could also affect any other processor that shares resources and not just Intel chips or hyperthreading chips, Intel has pointed out. Nevertheless, the Santa Clara, Calif.-based chip giant expects future versions of the Microsoft Windows and Linux operating systems to fix the problem.

Since discovering the flaw in October 2004, Percival has been working with FreeBSD and other operating systems developers to assess the risks, and various responses are posted on his site. Operating systems that do not exploit hyperthreading and keep it disabled, such as SCO's UnixWare, are said to be immune.

Peter Judge of ZDNet UK reported from London.

8 comments

Join the conversation!
Add your comment
What nonsense
This article illustrates a little knowledge is a dangerous thing! To call this a flaw is to say that every computer using a volatile memory has an inherint flaw. Was someone looking for funding?
Posted by (2 comments )
Reply Link Flag
Spent too much time in academia
In order to exploit this flaw, the hacker must already have full control of a system. If someone has full control of a computer, then why bother reading the CPU cache, if you can just read the keyboard directly?

Oh wait that would not get published, but sadly this did.
Posted by sanenazok (3449 comments )
Link Flag
Go and look at this guys website
You might see an interesting aspect the article does not mention, this guy is developing a cryptography suite. Is this the motivation for coming out with a problem statement that affects all modern computers?
Posted by (2 comments )
Reply Link Flag
 

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot

Discussions

Shared

RSS Feeds

Add headlines from CNET News to your homepage or feedreader.