kvidndnc

7 posts

kvidndnc

kvidndnc

@idolion_

Katılım Ocak 2019
142 Takip Edilen47 Takipçiler
David Kaplan
David Kaplan@depletionmode·
Still struggling with my Ryzenfall-1 repro. Writing 0x10000 to *MSR[0xc00110a2]+0x10500+0x44 does, in fact, dump some info string to a provided location. However, the PSP mailbox should be at *MSR[0xc00110a2]+0x70 and writing there is to no response. ?!?!?
David Kaplan tweet media
English
1
0
9
0
kvidndnc
kvidndnc@idolion_·
@depletionmode Haha, this comment confused us too. It was not actually enforced.
English
2
0
1
0
David Kaplan
David Kaplan@depletionmode·
Is it that this mechanism didn't work? Or perhaps it was added after your vuln disclosure? (but the git history dates seem to be prior to that..)?
English
1
0
0
0
David Kaplan
David Kaplan@depletionmode·
@idolion_ Hi Ido. I'm trying to repro Ryzenfall-1. Just wondering about this comment in the coreboot psp mailbox code. It seems that non-SMM code on platforms that correctly notify psp of boot done should not be able to send MBOX_BIOS_CMD_S3_DATA_INFO. What am I missing here?
David Kaplan tweet media
English
1
0
0
0
kvidndnc
kvidndnc@idolion_·
@Rewt_1 @uri_farkas Hi David, I'm glad you liked it! Both EPYC and Ryzen lines of processors are vuln to #amdflaws, with similar implications on both (credential guard bypass, PSP firmware patching, etc). We haven't tested older CPUs like Opteron
English
0
1
2
0
David Routin
David Routin@Rewt_1·
@idolion_ @uri_farkas Hi ! we loved your presentation ! And I imagine the personal investment on it... I was wondering if all AMD proc can be abused or if only specific model are subject to this ? New models etc ?
English
1
0
1
0
kvidndnc
kvidndnc@idolion_·
@RecordingExpert @binitamshah Yes remote access is needed. One use case we showed in our lecture is Mimikatz that's able to bypass Crdential Guard mitigations
English
0
0
0
0