Go Back   OC3D Forums > [OC3D] General Forums > OC3D News
Reply
 
Thread Tools Display Modes
 
  #1  
Old 28-05-18, 12:19 PM
WYP's Avatar
WYP WYP is offline
News Guru
 
Join Date: Dec 2010
Location: Northern Ireland
Posts: 16,043
AMD's EPYC SEV encryption reportedly "SEVered" by German researchers

AMD's EPYC SEV encryption has been reportedly "SEVered" by German researchers. Why does every exploit need a clever name these days?



Read more about AMD's EPYC SEV encryption being "SEVered" by security researchers.

__________________
_______________________________
Twitter - @WYP_PC
Reply With Quote
  #2  
Old 28-05-18, 02:36 PM
BFBC2033 BFBC2033 is offline
Newbie
 
Join Date: May 2018
Posts: 3
Unfortunately a key detail is missing. It needs full admin access on the host, which truns this into a Bug not a Security Flaw. Sad to see the same kind of fake news as with the amdflaws. But it seems like the SEV feature does not truely isolate the hyper-visor, maybe we will get there soon.
Reply With Quote
  #3  
Old 28-05-18, 03:00 PM
WYP's Avatar
WYP WYP is offline
News Guru
 
Join Date: Dec 2010
Location: Northern Ireland
Posts: 16,043
Quote:
Originally Posted by BFBC2033 View Post
Unfortunately a key detail is missing. It needs full admin access on the host, which truns this into a Bug not a Security Flaw. Sad to see the same kind of fake news as with the amdflaws. But it seems like the SEV feature does not truely isolate the hyper-visor, maybe we will get there soon.
Thanks for the correction, the article has been updated. A note has also been added at the base of the article to credit you for your help.
__________________
_______________________________
Twitter - @WYP_PC
Reply With Quote
  #4  
Old 28-05-18, 04:38 PM
RobM's Avatar
RobM RobM is offline
OC3D Elite
 
Join Date: May 2016
Location: Durham
Posts: 1,373
Seems these security firms are quite happy to trash AMD
__________________
ASUS Prime x370 Pro | Ryzen 5 1600 | Antec 240 AIO | Corsair Vengance RGB 3000 2 x 8Gb | Asus Strix RX 470 | Samsung Evo 120gb ssd | Seagate Baracuda 1tb storage | EVGA 500w | Phanteks Entho ProM Acrylic Window | Windows 10 and Linux Manjaro
Reply With Quote
  #5  
Old 30-05-18, 03:58 AM
Kleptobot's Avatar
Kleptobot Kleptobot is offline
Member
 
Join Date: Dec 2012
Location: Melbourne Australia
Posts: 246
Quote:
Originally Posted by RobM View Post
Seems these security firms are quite happy to trash AMD
I think AMD has a little bit of a target on their backs because they were less susceptible to specter and meltdown
__________________
delided 3570k (watercooled)
hd7970 (watercooled)
8GB Gskill XM
3*140 SR1 Rad
all stuffed in an FD arc midi
Reply With Quote
  #6  
Old 03-06-18, 10:20 AM
Emu Emu is offline
Member
 
Join Date: Jan 2015
Location: Australia
Posts: 121
This attack apparently requires a modified hypervisor to work along with a service on the virtual machine that will provide access to resources. Basically the hypervisor fiddles with the physical location of logical memory locations and then accesses those via a resource providing service on the virtual machine.

I don't think that this would be an issue if you are running your own virtual machine setup as you could use secure boot to protect the hypervisor from tampering. As for third party VM hosting, how well do you trust the third party?
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump










All times are GMT. The time now is 08:29 AM.
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2019, vBulletin Solutions, Inc.