Millions of Web users could be vulnerable to an attack on their computer's DRAM via the Web, a surprising development that expands on a bug that has increasingly worried computer security experts.
It has been known for several years that densely packed memory cells on computers are vulnerable to intentional interference. But a new research paper details how an attack could be conducted over the Web, dramatically increasing the danger to users.
The new paper, published by Austrian and French institutions, could prompt a new urgency among chipmakers to find a long-term solution to the so-called Rowhammer problem.
DRAM is vulnerable to electrical interference because the cells are packed so closely together, a characteristic that has increased their memory capacity but come at a cost.
Repeatedly accessing a row of memory cells can cause adjacent ones to change their binary values using a technique that's been described as rowhammering. The electrical leakage was once thought to be more of a reliability issue rather than a security one, but that view is quickly changing.
Google researchers said earlier this year they developed two successful exploits: a privilege escalation attack and another one that used rowhammer-induced bit flips to gain kernel-level privileges. However, the exploits had to be installed on a user's machine.
It also doesn't require physical access to a computer, which makes it a lot more dangerous. That also means that large numbers of people could be targeted over the Web, increasing its potential victim pool.
"Since the attack can be performed on an arbitrary number of victim machines simultaneously and stealthily, it poses an enormous security threat," they wrote.
In addition, many different types of computers are vulnerable, regardless of operating system, as the rowhammer bug affects many kinds of microchip architectures. The researchers are still figuring how exactly how many systems would be vulnerable to their attack.
So far, the researchers have not developed an exploit that would give root access to a computer using rowhammering, but they expect attackers eventually to expand on the capabilities of the exploit they discovered.
Until a longer term solution to Rowhammer.js is found, the researchers proposed that Web browsers should be updated to include a test to figure out if a computer is vulnerable.
The paper was co-authored by Daniel Gruss and Stefan Mangard of Graz University of Technology in Austria, and Clementine Maurice of Technicolor and Eurecom in France.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.