FNX Magokiler Posted September 28, 2023 Posted September 28, 2023 Researchers at the University of Texas at Austin have discovered a vulnerability that affects all graphics cards. This side channel vulnerability allows a malicious website to deliver private information without user consent. According to the research, this affects all graphics cards on the market, whether they are from Intel, AMD, NVIDIA, Apple, ARM or Qualcomm. There are many security protocols to prevent the theft of sensitive user information. One of these mechanisms is the same origin policy, which requires complete isolation between the domain and the content. This mechanism, among others, tries to prevent the theft of passwords to access different services. Among the mechanisms used is masking passwords with dots when we enter them. Although, there are times when previews are allowed to ensure that we do not make mistakes. They can get your password "thanks" to the graphics card The first thing you should know is that, to exploit this vulnerability, you must access a malicious website. Within these websites what is done is a reconstruction of the representation of pixels generated by the GPU. In the end, we are writing the password and it is represented by this component and that is how the theft is achieved. We have to highlight that researchers have said that the GPU-zip vulnerability (the name given to it by researchers) is serious, but the threat is low. They have highlighted that graphics card manufacturers must release software patches and make hardware adjustments. This vulnerability exploits data compression on the GPU. This mechanism allows reducing the amount of data stored and its transit. Since compression depends on the data, these are a mathematical representation that "doubles" the original size. Despite this mechanism, a data relationship exists and the initial parameter can be obtained again. Even with compression, initial information can be obtained. We have compression of data from the GPU that is sent to the DRAM or the different system caches. In the end, it is the original data modified so that it takes up less space. Despite this "mani[CENSORED]tion" the bits of the original information can be recovered. Passwords, usernames and other valuable information can be reconstructed pixel by pixel through rendering. https://hardzone.es/noticias/tarjetas-graficas/nvidia-amd-intel-vulnerabilidad-robar-contrasenas/ Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.