this post was submitted on 12 Aug 2024
511 points (95.7% liked)

Selfhosted

40329 readers
310 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

Here we are - 3600 which was still under manufacture 2-3 years ago are not get patched. Shame on you AMD, if it is true.

you are viewing a single comment's thread
view the rest of the comments
[–] Kolanaki@yiffit.net 31 points 3 months ago (2 children)

How severe is this vulnerability?

[–] ducking_donuts@lemm.ee 65 points 3 months ago (2 children)

The good news is that in order to exploit the new vulnerability, the attacker first has to obtain kernel level access to the system somehow - by exploiting some other vulnerabilities perhaps.

The bad news is once Sinkclose attack is performed, it can be hard to detect and mitigate: it can even survive an OS reinstall.

[–] scoutFDT@lemm.ee 54 points 3 months ago (2 children)

So basically what you are saying is we just need one pvp game with kernel level anti cheat to fuck up somewhere...... yeah I'm sure that's not going to happen.

[–] Appoxo@lemmy.dbzer0.com 12 points 3 months ago (3 children)

Probably only on a targeted attack. I don't see it being a mass target attack like a worm could be.
And in the realm of businesses, how many programs are running in kernel level besides the antivirus/ED(P)R solution?

[–] weker01@sh.itjust.works 12 points 3 months ago

And with crowd strike we have seen how reliable Antivirus is.

[–] conciselyverbose@sh.itjust.works 4 points 3 months ago (1 children)

I don't see it being a mass target attack like a worm could be.

Why not? Malware that survives a full new install is extremely valuable, and there are loads of games adding vulnerabilities with required kernel level rootkits. It's only a matter of time until one of these vendors is exploited, and why wouldn't you permanently own the significant chunk of the market with unpatched serious vulnerabilities while you're at it?

[–] Appoxo@lemmy.dbzer0.com 1 points 3 months ago (1 children)

Again: Mass spread vs target attack.
Remember WannaCry? Yeah, I don't see that happen.
But (industrial) e-spionage on the other hand? Yup. Will happen 100%

[–] conciselyverbose@sh.itjust.works 1 points 3 months ago (1 children)

For what reason?

Kernel level game anticheats are a great attack vector, and it's one that inherently identifies and enables distribution to other vulnerable targets. It's begging to self replicate.

Industrial espionage does not make sense, because most enterprises have, even if imperfect, restrictions on what can be installed on company computers that contain valuable information. You're not going to get a game with kernel malware on a managed enterprise computer.

[–] Appoxo@lemmy.dbzer0.com 2 points 3 months ago* (last edited 3 months ago) (1 children)

Are you ignoring what I wrote earlier in the same thread?

Probably only on a targeted attack. I don't see it being a mass target attack like a worm could be. And in the realm of businesses, how many programs are running in kernel level besides the antivirus/ED(P)R solution?

Anyway. Counter question: Why do you think gamers appear as a more valuable target with the anti cheat as a possible attack vector vs a business running literally the same CPU line-up but with fewer kernel level programs?

My personal opinion: You can't extract as much money from private folks vs a business through blackmail and other solutions. Not in a wide casted attack.
Targeted individuals can be assumed to be at a higher risk (e.g. hacking their private devices like the gaming pc and then doing home office work in the same network, or misusing trust in the home network between pc and phone and then installing malware like pegasus).
But again: Not in a wide casted net. And you are probably better of using the good exploits for higher value targets.

[–] conciselyverbose@sh.itjust.works 2 points 3 months ago

You're responding to a post about exploiting kernel level anticheat and saying it would only be a targeted attack, despite that inherently not making sense. When you find a vulnerability in that software, there is absolutely no reason not to spread it en masse. The cost to infect one person is the same as the cost to affect tens of thousands or more. The game is both the vulnerability and the distribution method.

Gamers aren't more valuable. They're more accessible. Because there isn't a kernel rootkit "anticheat" developer on the planet who gives two shits about security in any context, and there are a massive number of systems that their insane hacky bullshit touches. Every single one of them has their security automatically compromised. The goal isn't just information. You're getting a massive, distributed, residential IP botnet that you can't lose unless they throw their systems in the trash.

[–] possiblylinux127@lemmy.zip 1 points 3 months ago

The USB and network stack

[–] JASN_DE@lemmy.world 10 points 3 months ago (1 children)

The other bad news: there are so many vulnerabilities on all systems which can be used to gain root-level access, it's just a matter of time. Also, even future vulnerabilities will be an issue, as the underlying Sinkclose attacks will still work.

[–] possiblylinux127@lemmy.zip 2 points 3 months ago (1 children)

Honestly not on a hardened setup

[–] JASN_DE@lemmy.world 1 points 3 months ago (1 children)

Sure, if you'd rather like to believe that.

[–] possiblylinux127@lemmy.zip 2 points 3 months ago

If it was that easy to get root then we would be in serious trouble. The best way I can think of is social engineering.

[–] TheHolm@aussie.zone 15 points 3 months ago (1 children)

You need to be a root to exploit it, but if it get exploited any way to get rid of it is to throw MB to trash.

[–] Appoxo@lemmy.dbzer0.com 8 points 3 months ago (1 children)

Patch/reflash with a new bios?

[–] Vash63@lemmy.world 6 points 3 months ago (3 children)

How do you trust that the flash was done properly if you did it from the compromised system? This would only work if you flashed it externally somehow without the system running.

[–] possiblylinux127@lemmy.zip 4 points 3 months ago

A flash programmer

[–] Appoxo@lemmy.dbzer0.com 2 points 3 months ago (1 children)
[–] Vash63@lemmy.world 1 points 3 months ago

Exactly. That's why it's a trash motherboard as soon as root access is gained. It can never again be trusted.