Saturday, January 6, 2018

Massive Intel CPU Bug Leaves Kernel Vulnerable, Slows Performance - Intel CPU kernel memory leak vulnerability #Spectre (CVE-2017-5753、CVE-2017-5715) and #Meltdown (CVE-2017-5754) #SideChannelAttack - How to verify the patch is work by using Microsoft PowerShell Script

You need to have PowerShell 3.0 or above to run the

The following link is Windows Management Framework 5.1

https://www.microsoft.com/en-us/download/details.aspx?id=54616

Run PowerShell under admin right:

1. Enable PowerShell to run script:

Set-ExecutionPolicy RemoteSigned

2. Run the pre-requirement check of install WMF5.1 by using the PowerShell "Install0WMF5.1.ps1"

clip_image002

Please note that for Windows 7 and Windows Server 2008 R2 the installation instructions have changed significantly. Please read the Install and Configure topic in the release notes. We have removed the requirement for pre-installing WMF 4 on Windows 7 and Windows Server 2008 R2, but to do so we had create a script for checking the prerequisites that accompanies the MSU in a ZIP file. WMF 5.1 requires .Net version 4.5.2, and cannot be installed on Windows 7 or Windows Server 2008 R2 if WMF 3.0 is installed. This affects only Windows 7 and Windows Server 2008 R2. The Install and Configure topic in the release notes provides details on using the script.

https://blogs.msdn.microsoft.com/powershell/2017/01/19/windows-management-framework-wmf-5-1-released/

3. Reboot the computer is required after upgrade the WMF

4. Follow the instruction to valid those servers and application

clip_image004

Before install the patch

clip_image006

After install the Patch:

clip_image008

To enable the mitigations

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0 /f

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f


Reference:

https://support.microsoft.com/en-gb/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution

https://betanews.com/2018/01/05/microsoft-powershell-meltdown-spectre-script/

http://mikefrobbins.com/2018/01/04/using-powershell-to-check-remote-windows-systems-for-cve-2017-5754-meltdown-and-cve-2017-5715-spectre/

http://news.softpedia.com/news/the-complete-guide-how-to-patch-meltdown-and-spectre-vulnerabilities-on-windows-519226.shtml

https://www.techrepublic.com/article/emergency-windows-meltdown-patch-may-be-incompatible-with-your-pc/ Print Friendly and PDF
Share/Bookmark

No comments:

Post a Comment