Welcome to WarBulletin - your new best friend in the world of gaming. We're all about bringing you the hottest updates and juicy insights from across the gaming universe. Are you into epic RPG adventures or fast-paced eSports? We've got you covered with the latest scoop on everything from next-level PC gaming rigs to the coolest game releases. But hey, we're more than just news! Ever wondered what goes on behind the scenes of your favorite games? We're talking exclusive interviews with the brains behind the games, fresh off-the-press photos and videos straight from gaming conventions, and, of course, breaking news that you just can't miss. We know you love gaming 24/7, and that's why we're here round the clock, updating you on all things gaming. Whether it's the lowdown on a new patch or the buzz about the next big gaming celeb, we're on it.

Contacts

  • Owner: SNOWLAND s.r.o.
  • Registration certificate 06691200
  • 16200, Na okraji 381/41, Veleslavín, 162 00 Praha 6
  • Czech Republic

AMD’s Zen 3 & Zen 2 CPUs Now Vulnerable To “Zenhammer”, Prompting Memory Leakage

AMD's Zen platform is reportedly vulnerable to Rowhammer attacks, as revealed in new research by ETH Zurich, affecting the usability of DRAM.

AMD Relatively Older Systems With Zen 3 & Zen 2 CPUs Now Susceptible To Zenhammer, Company Advises Precaution To Users

Rowhammer is quite an old vulnerability, initially discovered in 2014 through collaborative research by Carnegie Mellon University and Intel. This breach affects your DRAM's contents by prompting an electric leakage in memory cells, potentially flipping the bits present to corrupt the data in the memory. Moreover, it could also lead to intruders getting access to sensitive information, and the vulnerability has expanded to AMD's Zen systems, which is why it is labeled as "Zenhammer" now.

Related Story TSMC 3nm To Dominate Apple, Intel & AMD Products, Leading To Significant Revenue Increase

Independent researchers from ETH Zurich have found a way to disrupt your memory contents through the Rowhammer implementation, by flipping the bits in DDR4 memory mounted in Zen 2 and Zen 3 systems. Here is how they were able to do it:

The research showed that AMD systems were vulnerable, similar to how Intel-based systems are, and after successfully exploiting the secret DRAM address functions, the researchers were able to adjust the timing routine and, through extensive tests, were able to integrate Rowhammer's effects into the systems, flipping the memory contents in both Zen 2 and Zen 3 systems. While this situation is alarming for relatively old AMD consumers, Team Red has responded quickly to the problem and released a security brief to address it.

For users particularly concerned with Zenhammer, we advise them to implement mitigations suggested by Team Red themselves to stay safe from the vulnerability. Meanwhile, the company is working on assessing the situation and providing a more extensive update.

News Sources: The Register, Comsec

Read more on wccftech.com