{"vuid":"VU#911878","idnumber":"911878","name":"Simultaneous multithreading processors may leak information through cache eviction analysis techniques","keywords":["HTT","Intel Hyper-Threading Technology","simultaneous multithreading","shared memory cache eviction","information disclosure","Oracle_CPU_Oct_2006"],"overview":"Operating systems on hardware platforms supporting simultaneous multi-threading (Hyper-Threading technology in particular) are potentially vulnerable to information leakage to local users. Proof of concept papers and code demonstrating successful attacks against cryptographic keys are in public circulation.","clean_desc":"Hyper-Threading (HT) Technology allows two series of instructions to run simultaneously and independently on a single processor. With Hyper-Threading Technology enabled, the system treats a physical processor as two \"logical\" processors. Each logical processor is allocated a thread on which to work, as well as a share of execution resources such as cache memories, execution units, and buses. Information could potentially be deduced by local users using programs capable of shared memory cache eviction analysis. Proof of concept code using timing and cache eviction analysis techniques have demonstrated that cyptographic keys can be deduced on Intel processors with Hyper-Threading technology (HTT) . It is likely that similar techniques could be employed on other processor architectures that support simultaneous multithreading. This vulnerability is applicable to many operating system platforms running on a hardware platform that supports simultaneous multithreading (Intel HTT in particular). Colin Percival has released a paper \"Cache Missing for Fun and Profit\" that demonstrates shared access to memory caches provide a potential covert channel between threads, and also permit a malicious thread to monitor the execution of another thread, potentially allowing for theft of cryptographic keys. Vendors have started providing patches and configuration information to disable simultaneous multithreading/HTT support. Warning: On dual-core (multiple CPU) systems this could have the undesirable effect of disabling all but one of the CPUs. For single core (CPU) systems this workaround may still impact the performance of the server (depending on load). Organizations need to assess whether the performance impact of disabling simultaneous multithreading/HTT support is worthwhile relative to the risk of successful compromise of sensitive information.","impact":"Sensitive information, including cryptographic key material, may be leaked to other local users on the affected system. The paper describing this issue and its corresponding proof-of-concept exploit make assumptions about the relative quiescence of the target system. At this stage it is unclear how viable the analysis techniques outlined in the above paper would be on busy systems. Single user workstations and systems where users do not have the ability to run their own programs are unlikely to be affected by this specific issue.","resolution":"We are not aware of an all encompassing short term solution to this issue.","workarounds":"Workarounds Disabling of simultaneous multithreading/HTT support at the operating system or BIOS level may reduce the likelihood of successful attack using the methods outlined in Colin's paper, however it may not mitigate against other similar types of attackes.","sysaffected":"","thanks":"Colin Percival is credited with bringing the issue to the attention of vendors and the wider community.","author":"This document was written by Robert Mead and Chad Dougherty.","public":["ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:09.htt.asc","http://www.daemonology.net/hyperthreading-considered-harmful/","http://www.daemonology.net/papers/htt.pdf","http://cr.yp.to/antiforgery/cachetiming-20041111.pdf","http://jvn.jp/cert/JVNVU%23911878/index.html"],"cveids":["CVE-2005-0109"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-13T15:36:26Z","publicdate":"2005-05-13T00:00:00Z","datefirstpublished":"2005-05-23T18:51:52Z","dateupdated":"2005-08-05T20:29:27Z","revision":27,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"18","cam_exploitation":"1","cam_internetinfrastructure":"12","cam_population":"17","cam_impact":"14","cam_easeofexploitation":"6","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.30025","cam_scorecurrentwidelyknown":"8.83575","cam_scorecurrentwidelyknownexploited":"13.923","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.30025,"vulnote":null}