After the two major security vulnerabilities of Meltdown and Spectre were discovered, the vulnerabilities in Intel processors began to appear, especially the ghost vulnerabilities.
Now, two security researchers from Vladimir Kiriansky of MIT and Carl Waldspurger of the consulting firm have discovered a new variant of Phantom Vulnerability on Intel processors called Spectre v1.1 with security number CVE-2018- 3693.
The new vulnerability is similar to other variants of the Ghost, and it also utilizes the predictive execution engine on the Intel processor to initiate a Border Check Bypass Storage (BCBS) attack.
On infected machines, malicious programs can change function pointers, return addresses in the predictive execution engine, and redirect data streams to unprotected memory address spaces so that malware can be read and used at any time.
The data stream here can be any type of data, including personal privacy such as encryption keys, passwords, and the like.
The researchers also pointed out that the Spectre v1.2 vulnerability variant, on a processor that does not enforce read-write protection, predicts storage to cover system data and code pointers, thereby breaking the sandbox.
Intel has validated Specre v1.1, v1.2 on its processor and will resolve it in the quarterly patch set push.
According to Intel's vulnerability award policy, Vladimir Kiriansky and Carl Waldspurger are expected to receive a $100,000 prize.
Looking at this situation, there will be new ghost vulnerabilities in the future that will attack Intel processors, but since the basic principles are similar, the fix will be faster.