Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

circumstances #2

Open
daslicht opened this issue Mar 24, 2024 · 7 comments
Open

circumstances #2

daslicht opened this issue Mar 24, 2024 · 7 comments

Comments

@daslicht
Copy link

daslicht commented Mar 24, 2024

can this exploid run without installing code on teh target machine? Or how else could that be a danger? please
Or is there still a way to execute arbitary code from remote, wasn't that patched?

@Darival
Copy link

Darival commented Mar 24, 2024

I always find it funny when news outlets take a vulnerability so out of proportion ignoring the fact that the attacker need to get access to your computer.
don't get me wrong it is still a vulnerability and need to be addressed by apple but no need to throw away your m1 mac

@emilcondrea
Copy link

emilcondrea commented Mar 24, 2024

That's the main question!

Even if it does not require installation of malicious app, can the exploit be triggered from javascript that's executed when visiting malicious website? If that's true, is very bad! One way of exploiting this requires 2 steps 1) serving malicious js on public networks that require signin over http(eg. hotels, airports). 2) the attacker, being on the same network, monitors the encrypted traffic of the victim and through malicious js from 1) that still runs in the other tab, execute Gofetch attack to figure out the TLS keys, so it can completely hijack the victim.

There are a couple of sidechannel attacks that can be achieved from javascript, see Fantastic Timers and where to find them

@daslicht
Copy link
Author

daslicht commented Mar 24, 2024

I always find it funny when news outlets take a vulnerability so out of proportion ignoring the fact that the attacker need to get access to your computer. don't get me wrong it is still a vulnerability and need to be addressed by apple but no need to throw away your m1 mac

Exactly what I thought, I ve read so much B$ on social media so I though to clear it out I just ask some profis here :)
So you confirm, it is not possible via JavaScript over the internet?

@mevanloon
Copy link

In theory the exploit could run on WASM (low-level code in JS), since the exploit would supposedly ignore the sandbox that it's in. But I don't know enough about the low-level stuff to answer that.

@daslicht
Copy link
Author

daslicht commented Mar 25, 2024

In theory the exploit could run on WASM (low-level code in JS), since the exploit would supposedly ignore the sandbox that it's in. But I don't know enough about the low-level stuff to answer that.

Related:
https://www.forcepoint.com/blog/x-labs/webassembly-potentials-and-pitfalls
https://github.com/stevespringett/disable-webassembly

So the question is: "How to disable WASM in Safari"

@gerrywastaken
Copy link

gerrywastaken commented Mar 29, 2024

So as far as I know, browser vendors and others made timers less precise in an attempted mitigation against such attacks via javascript:
https://v8.dev/blog/spectre#timer-mitigations

It wouldn't make sense for them to reintroduce the attack vector via WASM.

I just wonder if similar threading techniques to those mentioned in the gofetch paper could be used to work around the timer limitations in js/wasm. Interesting times.

@mevanloon
Copy link

@bl4zk0
They're the same architecture, basically the same chips.

But as noted on the homepage, Hector Martin found a chicken bit that disables DMP, so it can be patched.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

5 participants