this post was submitted on 26 Sep 2023
333 points (98.3% liked)

Technology

58133 readers
4819 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

GPUs from all six of the major suppliers are vulnerable to a newly discovered attack that allows malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites, researchers have demonstrated in a paper published Tuesday.

The cross-origin attack allows a malicious website from one domain—say, example.com—to effectively read the pixels displayed by a website from example.org, or another different domain. Attackers can then reconstruct them in a way that allows them to view the words or images displayed by the latter site. This leakage violates a critical security principle that forms one of the most fundamental security boundaries safeguarding the Internet. Known as the same origin policy, it mandates that content hosted on one website domain be isolated from all other website domains.

...

The security threats that can result when HTML is embedded in iframes on malicious websites have been well-known for more than a decade. Most websites restrict the cross-origin embedding of pages displaying user names, passwords, or other sensitive content through X-Frame-Options or Content-Security-Policy headers. Not all, however, do. One example is Wikipedia, which shows the usernames of people who log in to their accounts. A person who wants to remain anonymous while visiting a site they don’t trust could be outed if it contained an iframe containing a link to https://en.wikipedia.org/wiki/Main_Page.

Pixel stealing PoC for deanonymizing a user, run with other tabs open playing video. “Ground Truth” is the victim iframe (Wikipedia logged in as “Yingchenw”). “AMD” is the attack result on a Ryzen 7 4800U after 30 minutes, with 97 percent accuracy. “Intel” is the attack result for an i7-8700 after 215 minutes with 98 percent accuracy.

The researchers showed how GPU.zip allows a malicious website they created for their PoC to steal pixels one by one for a user’s Wikipedia username. The attack works on GPUs provided by Apple, Intel, AMD, Qualcomm, Arm, and Nvidia. On AMD’s Ryzen 7 4800U, GPU.zip took about 30 minutes to render the targeted pixels with 97 percent accuracy. The attack required 215 minutes to reconstruct the pixels when displayed on a system running an Intel i7-8700.

...

you are viewing a single comment's thread
view the rest of the comments
[–] atzanteol@sh.itjust.works 78 points 11 months ago (3 children)

Isn't this a browser vulnerability rather than a GPU one?

[–] Dadifer@lemmy.world 117 points 11 months ago* (last edited 11 months ago) (2 children)

The article is saying that the gpus use a compression that is software independent and bypasses the restrictions on iFrame cross-website loading. Chrome and Edge are affected; Safari and Firefox are not.

[–] Sylvartas@lemmy.world 123 points 11 months ago (1 children)
[–] RizzRustbolt@lemmy.world 4 points 11 months ago

Pale Moon actually already protected against this stuff. Because the team are all crazy paranoid.

[–] EyesEyesBaby@lemmy.world 97 points 11 months ago (1 children)

In other words, this only affects Chromium based browsers.

[–] tony@lemmy.hoyle.me.uk 28 points 11 months ago (3 children)

It's a timing vulnerability, based on how long it takes the GPU to render the page , I think, although it's also browser specific.

But seems low risk.. at a minimum of 30 minutes to grab a username, you'd have to be sat on the same page for a while and not notice your fans ramping up..

Also, passwords seems a stretch. No (sane) site displays passwords.

[–] geosoco@kbin.social 12 points 11 months ago

Many sites have had to enable reveal passwords for people with complicated passwords not using password managers.

It's low risk, but their numbers are also coming from fairly dated hardware and is just proof of concept. It can almost certainly be speed up significantly.

[–] systemglitch@lemmy.world 3 points 11 months ago

I built my pc to be silent. Case and fans. I would never year the Rams ramping up. But I also use FF shrug

[–] Alimentar@lemm.ee 0 points 11 months ago

What about the reveal password icon people use for complicated passwords?

[–] geosoco@kbin.social 8 points 11 months ago* (last edited 11 months ago)

The problem is that so many browsers leverage hardware acceleration and offer access to the GPUs. So yes, the browsers could fix the issue, but the underlying cause is the way GPUs handle data that the attack is leveraging. Fixing it would likely involve not using hardware acceleration.

As these patterns are processed by the iGPU, their varying degrees of redundancy cause the lossless compression output to depend on the secret pixel. The data-dependent compression output directly translates to data-dependent DRAM traffic and data-dependent cache occupancy. Consequently, we show that, even under the most passive threat model—where an attacker can only observe coarse-grained redundancy information of a pattern using a coarse-grained timer in the browser and lacks the ability to adaptively select input—individual pixels can be leaked. Our proof-of-concept attack succeeds on a range of devices (including computers, phones) from a variety of hardware vendors with distinct GPU architectures (Intel, AMD, Apple, Nvidia). Surprisingly, our attack also succeeds on discrete GPUs, and we have preliminary results indicating the presence of software-transparent compression on those architectures as well.

It sounds distantly similar to some of the canvas issues where the acceleration creates different artifacts which makes it possible to identify GPUs and fingerprint the browsers.