Login
Sign Up


You are using the mobile version of the forum, some features have been disabled to have it responsive.
Limelight Reunion 2024 - v4b1Limelight Discord
Ares Defence Services Discord
Limelight Reunion 2024 - v4b1Limelight DiscordAres Defence Services Discord

receiptDevelopment Blog:

Development Contributor Workflow

receiptHR Blog:

What *are* they doing over there?

receiptTeacher Blog:

Insight into the Teacher Team

receiptDevelopment Blog:

Infrastructure Upgrade 11/2019

receiptDevelopment Blog:

how suggestions???

receiptDevelopment Blog:

Planning for the future.


This forum uses cookies
This forum makes use of cookies to store your login information if you are registered, and your last visit if you are not. Cookies are small text documents stored on your computer; the cookies set by this forum can only be used on this website and pose no security risk. Cookies on this forum also track the specific topics you have read and when you last read them. Please confirm whether you accept or reject these cookies being set.

A cookie will be stored in your browser regardless of choice to prevent you being asked this question again. You will be able to change your cookie settings at any time using the link in the footer.

Closed 
[SECURITY] [CERT] Meltdown / Spectre
Burnett radio_button_checked
Security Officer, CityRP2 Core Developer
Developer
Posts: 3,222
Threads: 201
Likes Given: 1418
Likes Recieved: 3270 in 970 posts
Joined: Aug 2015
Reputation: 45
#1
Jan 8, 2018, 10:28 PM
Good evening community,

we feel it is our duty to inform you that your browsers/systems could be compromised by attackers.
Now this is nothing new as you can guess. However, there is some critical difference between some regular attacks and those Meltdown/Spectre exploits.

On the night of 3rd-4th January, Google's Project Zero released three CVE (Common Vulnerabilities and Exposures) documents that are explicitly demonstrating the following exploits:

  • CVE-2017-5715 (branch target injection - Spectre)
  • CVE-2017-5753 (bounds check bypass - Spectre)
  • CVE-2017-5754 (rogue data cache load - Meltdown)

Within hours, security researchers were able to steal browser passwords/tokens - all just by visiting some malicious websites.


Seeing that it is possible to compromise your systems without leaving any trace (no logs nothing), please update your systems/browsers in order to protect your data!
Various vendors have already released emergency patches/updates that you should apply now. 


How to protect your systems/browsers against Spectre/Meltdown:

https://www.cnet.com/how-to/how-to-fix-m...droid-ios/
If you have questions regarding Limelight Gaming's security, infrastructure or backend related topics,
feel free to contact me directly via Discord or PM.
Please note that confidential information cannot be disclosed.

Burnett
(This post was last modified: Jan 8, 2018, 10:29 PM by Burnett. Edited 1 time in total.)
Barkles radio_button_checked
The Joker in the pack
Core Staff
Posts: 2,051
Threads: 63
Likes Given: 687
Likes Recieved: 1587 in 730 posts
Joined: Aug 2015
Reputation: 22
#2
Jan 8, 2018, 10:48 PM
Limelight Gaming
Protecting browsers in your area.
[Image: Z8vTR8U.png]
(This post was last modified: Jan 8, 2018, 10:59 PM by Barkles. Edited 1 time in total.)
Closed 




Users browsing this thread: 1 Guest(s)