Vulnerability in Intel processors

Discussion in 'other security issues & news' started by BoerenkoolMetWorst, Dec 7, 2011.

Thread Status:
Not open for further replies.
  1. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,901
    Location:
    Outer space
  2. Ranget

    Ranget Registered Member

    Joined:
    Mar 24, 2011
    Posts:
    846
    Location:
    Not Really Sure :/
    how is that possible

    question how a processor could have a vulnerability ??
     
  3. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    For a long time CPUs have handled DEP - ie: Hardware DEP. You need software support but it's built in.

    Just as encryption can be built into a hard drive.

    There are a lot of security implementations, ROM code, etc built right onto your hardware.

    Errors in implementation and design exist in the hardware just as they do in the software.
     
  4. Ranget

    Ranget Registered Member

    Joined:
    Mar 24, 2011
    Posts:
    846
    Location:
    Not Really Sure :/
    i remember some of Athlon old CPU used to have
    "antivirus feature " written on the outside of the Box

    anyway i think that's a bit technical but
    how is a CPU going to Prevent Data execution
    on infected system

    if a Malware Run on the system it will run whether a cpu like that or not
    or whether we like that or not
    the cpu job all has to do is to crunch data :/ so
    how is that possible

    sorry for asking but i didn't understand what has the cpu to do with
    antivirus software
     
  5. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Data Execution Prevention (DEP) does not stop programs or malware from running. It provides (hardware) support to create executable and nonexecutable address space in memory.

    This doesn't stop malware necessarily but it makes exploits a lot harder. If I exploit a program with DEP I can't just load whatever I like into memory and run my malware because the address space isn't executable.

    There are ways around this (return oriented programming) but in conjunction with other methods it is very effective at preventing exploits.
     
  6. Ranget

    Ranget Registered Member

    Joined:
    Mar 24, 2011
    Posts:
    846
    Location:
    Not Really Sure :/
    thanks for the info
    Hungry Man
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.