Meltdown Patch Opened Bigger Security Hole on Windows 7
Meltdown Patch Opened Bigger Security Hole on Windows 7 Microsoft's Meltdown patch has opened an even bigger security hole on Windows 7, allowing any user-level application to read content from the operating system's kernel, and even write data to kernel memory. Swedish IT security expert Ulf Frisk made the discovery earlier this month while working on PCILeech, a device he created a few years back for carrying out Direct Memory Access (DMA) attacks and dumping protected OS memory. Frisk says that Microsoft's Meltdown patch (for CVE-2017-5754) —released in the January 2018 Patch Tuesday— accidentally flipped a bit that controls the access permission for kernel memory. Frisk explains: In short - the User/Supervisor permission bit was set to User in the PML4 self-referencing entry. This made the page tables available to user mode…
