Top
Best
New

Posted by MrBruh 1 day ago

The RCE that AMD won't fix(mrbruh.com)
359 points | 155 commentspage 2
carefree-bob 1 day ago|
From the title, I thought this was going to be another one of those speculative execution information leakage bugs that are basically impossible to fix, but something this simple and easily fixable -- it's discouraging. Hopefully this decision is reversed. Also "Thank you for hacking our product" seems a bit unprofessional for someone engaging in responsible disclosure for a major security issue with your product.
tgsovlerkhgsel 15 hours ago|
"Thank you for hacking our product" sounds perfectly appropriate to me; it clearly uses "hacking" in the positive sense.
Delk 13 hours ago||
It actually says "hacking on one of our programs", which makes it even more obvious that it's using the word closer to the positive traditional hacker culture sense.

I'm sure that still looks unprofessional to some people, just like any jargon that isn't corporatese does.

b1temy 1 day ago||
While I don't like that the executable's update URL is using just plain HTTP, AMD does explicitly state that in their program that attacks requiring man-in-the-middle or physical access is out-of-scope.

Whether you agree with whether this rule should be out-of-scope or not is a separate issue.

What I'm more curious about is the presence of both a Development and Production URL for their XML files, and their use of a Development URL in production. While like the author said, even though the URL is using TLS/SSL so it's "safe", I would be curious to know if the executable URLs are the same in both XML files, and if not, I would perform binary diffing between those two executables.

I imagine there might be some interesting differential there that might lead to a bug bounty. For example, maybe some developer debug tooling that is only present only in the development version but is not safe to use for production and could lead to exploitation, and since they seemed to use the Development URL in production for some reason...

rcxdude 21 hours ago||
For paying out, maybe, but this is 100% a high priority security issue regardless of AMD's definition of in scope, and yet because they won't pay out for it they also seem to have decided not to fix it.
pixl97 1 day ago||
> is a separate issue.

No, just no. This is not a separate issue. It is 100% the issue.

Lets say I'm a nation state attacker with resources. I write up my exploit and then do a BGP hijack of whatever IPs the driver host resolves to.

There you go, I compromised possibly millions of hosts all at once. You think anyone cares that this wasn't AMDs issue at this point?

b1temy 1 day ago||
You misunderstand.

I already said I do not like that it is just using HTTP, and yes, it is problematic.

What I am saying is that the issue the author reported and the issue that AMD considers man-in-the-middle attacks as out-of-scope, are two separate issues.

If someone reports that a homeowner has the keys visibly on top of their mat in front of their front-door, and the homeowner replies that they do not consider intruders entering their home as a problem, these are two separate issues, with the latter having wider ramifications (since it would determine whether other methods and vectors of mitm attacks, besides the one the author of the post reported, are declared out-of-scope as well). But that doesn't mean the former issue is unimportant, it just means that it was already acknowledged, and the latter issue is what should be focused on (At least on AMD's side. It still presents a problem for users who disagree with AMD of it being out-of-scope).

Dylan16807 1 day ago||
The phrasing of your first two sentences in your first post makes it sound like you're dismissing the security issue. For saying that it's a real security issue and then another issue on top you should word it very differently.
b1temy 1 day ago||
> The phrasing of your first two sentences in your first post makes it sound like you're dismissing the security issue.

Genuine question, How does it sound like I'm dismissing it? My first sentence begins with the the phrase

> I don't like that the executable's update URL is using just plain HTTP

And my second sentence

> Whether you agree with whether this rule should be out-of-scope or not is a separate issue.

which, with context that AMD reported MITM as out-of-scope, clearly indicates that I think of it as an issue, albeit, a separate one from the one the author already reported.

arjie 1 day ago||
Why even bother with WONTFIX? Turning on an nginx LetsEncrypt in front of it would have taken as long.
testing12_12 1 day ago|
[dead]
Dylan16807 1 day ago||
Yes coincidence.
raffraffraff 23 hours ago||
How the hell is it possible that they're still using the ATI domain and HTTP 2026? They acquired ATI 20 fucking years ago.

It really makes you wonder what level of dysfunction is actually possible inside a company. 30k employees and they can't get one of them to hook up certbot, and add an 's' to the software.

yellow_lead 1 day ago||
Many people don't worry about connecting to random wifi anymore, but users of AMD still have to
dbtablesorrows 23 hours ago|
I do usually worry - because DNS spoofing is still possible and we are one step (eg: a compromised certificate) away from being pwned. But yeah one shouldn't have to worry.
president_zippy 1 day ago||
Marking this as a WONTFIX should have gotten somebody fired at AMD. I find it hard to believe that at least one of their VPs doesn't frequent this site.

I don't normally call for people to get fired from their jobs, but this is so disgusting to anyone who takes even a modicum of pride in their contribution to society.

Surely, someone gets fired for dismissing a legitimate, easily exploited RCE using a simple plaintext HTTP MITM attack as a WONTFIX... Right???

throw0101a 12 hours ago||
Meta: somewhat surprised that they're still using ati.com. ATI was acquired back in 2006:

* https://en.wikipedia.org/wiki/ATI_Technologies

zbyforgotp 17 hours ago||
What is the root cause of this? It is said that AMD is hardware company and neglects software - but recently they issued lots of declarations of becoming software firs now.
svespalec 1 day ago||
This is unfortunate news but I'm not even surprised that they don't seem to care. Nice writeup.
moktonar 17 hours ago|
Bugdoors, bugdoors everywhere..

The fact that they refuse to fix is the sketchiest part, and also they should be held accountable for things like this IMO

More comments...