Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a...  <--  <--- Return to Home Page
   Networked Database  [GNG] Gated, Filtered alt.comp.a...   [474 / 759] RSS
 From   To   Subject   Date/Time 
Message   Virus    All   Questions about Spectre / Meltdown CPU vulnerabilities   January 3, 2018
 10:58 PM *  

From: Virus <Virus@Guy.C0M>

Is there a definative list of CPU models that are affected by Spectre / 
Meldown?

The most "detailed" explanation I can find is:

=============
"every processor since 1995 (except Intel Itanium and Intel Atom before 
2013)" is affected by Meltdown"
==============

I'd like to see a complete breakdown of the status of all Intel CPU's, 
going back to at least the SLOT-1 products and including socket 370, 
socket 478 and socket 775.

Also, what is status of Zeon CPU's, specifically socket 775-compatible ones?

Other questions:

These exploits don't seem to be able to take control of systems, alter 
protected or system memory or proccesses (or even user-space memory or 
files?), plant or install back doors or other forms of persistent 
access.  Yes?

These exploits make it possible for specifically-crafted code to be able 
to read system memory (ie - memory / data that they wouldn't normally 
have access to) but not necessarily be able to alter or corrupt said 
memory?  Yes?

Other than executing a binary delivered via email, is it possible to 
deliver a workable Spectre / Meltdown exploit in the form of a script 
written in any of the various web/browser compatible formats (JS, Java, 
html, etc)?
--- NewsGate v1.0 gamma 2
 * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to [GNG] Gated, Filtered alt.comp.a...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0778 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.0.140505

Warning: Unknown: open(c:\Sessions\sess_su5ulj2kr9ngsk9423maqf44u7, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0 PHP Warning: session_start(): open(c:\Sessions\sess_su5ulj2kr9ngsk9423maqf44u7, O_RDWR) failed: No such file or directory (2) in D:\wc5\http\public\VADV\include\common.inc.php on line 45 PHP Warning: Unknown: open(c:\Sessions\sess_su5ulj2kr9ngsk9423maqf44u7, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 PHP Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0