Telecom Tidbits
Jared's Network and Security Blog
  • Home
  • Telecom Corner
  • About
  • Contact
  • Donate
  • Site Index
  • Links

Exploiting Virtual Machines with RAM Row-Hammer Attacks

November 15, 2017 Jared Hall General

A “Row-hammer” attack exploits a physical problem that exists in RAM where an attacker can actually cause bit-flips in DRAM memory.  This has already been exploited and attacks successfully gained kernel privileges.  Researchers have taken this a step further and, by exploiting a Host kernel feature known as “memory de-duplication”, can flip bits in a controller manner allowing authentication to a victim’s Client Virtual Machine running on the same Host.

The exploit takes advantage of the Host O/S using a Linux feature known as KSM (Kernel Shared Memory, also called Kernel Samepage Merging).  For efficiency, most cloud-based Virtual Machines run Linux-based Operating Systems on the Host machine and by default, KSM is enabled.

The following document is a great overview of the attack mechanism and source-code links are provided.  Even if you have no interest in the attack itself, the article provides a great look into how memory controllers handle RAM; Channels, Ranks, Banks, Columns, and Rows:

Attacking a co-hosted VM: A hacker, a hammer and two memory modules

The moral of the story?  Don’t put stuff in the cloud that you can’t afford to lose or be exploited.

 

« BOLO: IcedID Banking Trojan/Emotet Trojan » Top Attacking Countries: October 2017

Tools & Downloads

Download Center

Categories

Good Reads (PDF)

Recent Posts

  • PayPal Woes and Degenerative AI
  • A Pathetic Defense of Julian Assange
  • Damned if you do. Damned if you don’t.
  • ProtonMail? Not Worth an Electron!
  • Give it a REST: Serious WordPress Bugs
$
Select Payment Method
Personal Info

Donation Total: $20.00

↑

  • Home
  • Telecom Corner
  • About
  • Contact
  • Donate
  • Site Index
  • Links
Temporal Based Intelligence © 2017