How to check if your PC is protected from the Meltdown and Spectre exploits

P

plat1098

There's not really anything more to be said..

Yes there is, sorry. The mitigations for the Spectre flaw are not a one-shot deal but apparently require ongoing applications indefinitely. How much of a clear and present danger is Spectre to the average user, really? It's more rhetorical. Backups and updates--yes, you're right but this is not the response I was looking for. It's a tough dilemma for some people.
 
D

Deleted member 65228

Yes there is, sorry. The mitigations for the Spectre flaw are not a one-shot deal but apparently require ongoing applications indefinitely. How much of a clear and present danger is Spectre to the average user, really? It's more rhetorical. Backups and updates--yes, you're right but this is not the response I was looking for. It's a tough dilemma for some people.
Currently, the danger of Spectre for the average user is quite small because Spectre is quite hard to make use of (exploit) and it also depends on the software being targeted for the attack. It also needs to be used against a target which can actually be leveraged for benefit of the attacker, so not all software will be a decent target. There's currently no known exploitation of the Spectre vulnerabilities in the wild, but this won't necessarily maintain this way forever more.
 
Last edited by a moderator:

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
For those who installed KB4056898... can it be uninstalled afterward?

Removed it on a couple of PCs for science sake. On one PC it took about an hour, but on the other one one a couple of minutes. Most of the time in the first instance was during the shutdown phase. It was stuck there for I guess 35-40 minutes or so. I was running benchmarks, so I wanted to get a look at them after removing the patch.

I started to use system restore, but apparently the patch can be simply uninstalled. This matches the information I had read posted for the patch on the Microsoft Update Catalog page containing the update. That was why I decided to give the uninstall a try.

I hate to say this, but, for me, there is a noticeable difference in the performance of a PC after the patch. Doesn't seem to matter what kind of processor...just less responsive overall.(n) That said, I do have a bothersome feeling that there is a better way to do this. Maybe this situation is one where the optimal fix would be more work than any of the other possible workarounds and one which requires some time to engineer. Obviously, it would be the least restrictive option with regards to resources and performance to be considered optimal and of course it must still guarantee a fully secure kernel.
 

Sunshine-boy

Level 28
Verified
Top Poster
Well-known
Apr 1, 2017
1,760
Ok my friend run the tool on vmare and tell us is it safe to use or no:D
Eset live gird rated the file as green and that means Eset ppl manually whitelisted the file! I guess its safe.
 

Attachments

  • 3.PNG
    3.PNG
    17.8 KB · Views: 329
Last edited:
D

Deleted member 65228

One question: how is a software-based creation going to patch a hardware/firmware vulnerability? You have to flash the firmware to update it, and hardware cannot be remotely changed. I'm not exactly sure what this Qihoo utility is actually going to accomplish. Maybe they will just check for updates related to Meltdown/Spectre fixes?

Feels a bit like someone offering you a plate of lasagna, you finally arrive at the restaurant, and half of it is missing. You know? Like you get something you have long-waited, and then it is half complete or half-available. A bit like a disappointment...

If it didn't work for @frogboy then I am sure it won't work for me.
 

Chimaira

Level 4
Verified
Well-known
Jan 5, 2018
163
So I know about the windows patch, I know about the firmware/BIOS updates from OEM manufacturers, but I haven't heard anything about any motherboard companies releasing new firmware/BIOS, like Gigabyte, Asus etc. What is the deal with them? How do users with custom built PC's attain full protection?
 
D

Deleted member 65228

What is the deal with them? How do users with custom built PC's attain full protection?
I'm wondering the same thing. I have an MSI motherboard for a custom built system however there's no BIOS update available and hasn't been for at-least a few weeks now as far as I am aware. However, no vendor is likely going to release an update for an really old system because they tend to use the 2-3 year range.

With that in mind, you don't need to worry about Meltdown or Spectre exploitation for the time being and I suspect this will stay put for at-least 6-12 months from now. There's no known exploitation of it within malicious software in the wild, and the Proof-Of-Concepts/original findings were by highly skilled researchers who allegedly had information about the CPU architectures which are private and not publicly disclosed - I do not know if this is factual or not though.

@Lockdown said on another thread exactly what it is, that malware authors which are traditional and release into the wild are not in this game for hardware/firmware exploitation. And even the ones who are capable of doing so, the chances of them accomplishing it are really small. You can throw the source code onto a malware authors lap and 99% chance they won't know how to use it, at-least to it's full potential.

Look at EternalBlue and WannaCry. Sure, it was used. Sure, EternalBlue was a government exploit. Sure, WannaCry did a lot of damage. But was it used to it's full potential? Nope. Kernel-Mode code execution via privilege escalation and the payload was user-mode. Says it all really.
 
D

Deleted member 65228

The CPU vulnerabilities influence a big range and sound terrifying, but if you keep good computer security habits, being safe is not difficult.

1. Keep your 360 Total Security up-to-date
2. Use “Patch up” to have your software up-to-date
3. Conduct a “Full Check” so our Internet Security feature will remind you if your browsers are outdated, which are often exploited by attackers.
4. Use “Driver Updater” to keep your drivers always up-to-date.
5. Use “Privacy Cleaner” to clean your online footprints so that cyber criminals can’t follow your track.
6. Upgrade to Premium so you can have First Priority Support when you face any issues.

Source: 360 released the Very First CPU Vulnerability Assessment and Fix Tool

Looks like I was right then, it works by checking for updates. It also has additional checks for other things regarding privacy and cleaning, and seems to be a marketing approach at gaining more Premium customers as well which is fine and normal for companies to do (standard marketing techniques by leveraging the recent fiasco).

For the record, the link content states how it works in clear view so there's nothing misleading going on here.
 

Chimaira

Level 4
Verified
Well-known
Jan 5, 2018
163
I'm wondering the same thing. I have an MSI motherboard for a custom built system however there's no BIOS update available and hasn't been for at-least a few weeks now as far as I am aware. However, no vendor is likely going to release an update for an really old system because they tend to use the 2-3 year range.

With that in mind, you don't need to worry about Meltdown or Spectre exploitation for the time being and I suspect this will stay put for at-least 6-12 months from now. There's no known exploitation of it within malicious software in the wild, and the Proof-Of-Concepts/original findings were by highly skilled researchers who allegedly had information about the CPU architectures which are private and not publicly disclosed - I do not know if this is factual or not though.

@Lockdown said on another thread exactly what it is, that malware authors which are traditional and release into the wild are not in this game for hardware/firmware exploitation. And even the ones who are capable of doing so, the chances of them accomplishing it are really small. You can throw the source code onto a malware authors lap and 99% chance they won't know how to use it, at-least to it's full potential.

Look at EternalBlue and WannaCry. Sure, it was used. Sure, EternalBlue was a government exploit. Sure, WannaCry did a lot of damage. But was it used to it's full potential? Nope. Kernel-Mode code execution via privilege escalation and the payload was user-mode. Says it all really.

Yeah, I'm not to worried about it affecting my system. It's just with all the attention this is getting it is strange that all the motherboard companies haven't said a word.
 

codswollip

Level 23
Content Creator
Well-known
Jan 29, 2017
1,201
I do have a bothersome feeling that there is a better way to do this
I have a sense that the rush to patch will result in buggy and inefficient "solutions". Better to wait a month or so or until a real threat looms. Even Google's plans to "harden" Chrome won't be realized until later in the month.
 
  • Like
Reactions: Andy Ful and AtlBo

upnorth

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
Quote : " Microsoft has identified a compatibility issue with a small number of antivirus software products.

The compatibility issue arises when antivirus applications make unsupported calls into Windows kernel memory. These calls may cause stop errors ( also known as blue screen errors ) that make the device unable to boot. To help prevent stop errors that are caused by incompatible antivirus applications, Microsoft is only offering the Windows security updates that were released on January 3, 2018, to devices that are running antivirus software that is from partners who have confirmed that their software is compatible with the January 2018 Windows operating system security update.

If you have not been offered the security update, you may be running incompatible antivirus software, and you should consult the software vendor. "

Quote : " Windows 10, Windows 8.1, Windows Server 2012 R2 and Windows Server 2016 Customers, Windows 7 SP1 and Windows Server 2008 R2 SP1 Customers. The anti-virus software must set a registry key as described below in order to receive the January 2018 security updates.

Key="HKEY_LOCAL_MACHINE" Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat" Value="cadca5fe-87d3-4b96-b7fb-a231484277cc" Type="REG_DWORD”
Data="0x00000000” "

Source : https://support.microsoft.com/en-sg...ndows-security-updates-and-antivirus-software
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top