Skip to content Skip to sidebar Skip to footer

MELTDOWN and SPECTRE Threatened Security Vulnerabilities in Processors DO THIS TIP!

The 2018 launch began with the discovery of a security vulnerability in modern processors that allows malicious programs to steal information from the memory of other programs. In other words, malicious programs such as malware can steal passwords, account information, encryption keys, or theoretically can retrieve anything stored in process memory. These security vulnerabilities are known as Meltdown and Specter.

This vulnerability has existed for more than 20 years in modern processor architectures such as Intel, AMD and ARM on servers, desktops and mobile devices. This means that all users using the platform are in a state of standby 1 if they do not take immediate action to address it. The security vulnerability that was reported as of January 3, 2018 immediately received a response from each operating system vendor who has now taken preventive steps to close the hole caused by Meltdown and Specter. ESET as a data security company, responded to this case and emerged as one of the few vendors to release the fastest patch which helped minimize the worst. This patch is available since update number 16681 as of January 4, 2018 at 14.25. ESET users who are registered and connected online will automatically receive this update.

Technical tips for implementation on Microsoft operating systems

  1. Update the Antivirus product used, make sure it supports this case. ESET already supports as per update 16681.
  2. Install January 2018 Windows Security Update16681, then restart.
  3. Update windows operating system based on KB4056892, then restart.
  4. MSSQL users are also required to patch (https://support.microsoft.com/en-us/help/4073225/guidance-for-sql-server)

These steps must be carried out sequentially as above, KB4056892 cannot be implemented if the Antivirus product used is not able to support closing this security hole. ESET Indonesia has prepared a detailed manual for the complete prevention steps via the following link http://kb.eset.co.id/index.php?solution_id=1284

In the knowledgebase link there is an explanation of how to overcome the security vulnerabilities of Meltdown and Specter, by following each step described will help users in bridging overcoming vulnerabilities.

Technical Consultant PT Prosperita – ESET Indonesia, Yudhi Kukuh, responding to this critical condition said: “The vulnerabilities due to Meltdown and Specter were surprising at the beginning of the year, all platforms are not safe from this vulnerability, all computers that use processors from 1995 until now very potential to be affected. This means that the operating systems on computers and mobile devices are at risk of being exploited. Therefore, it is recommended that users immediately move quickly to update their respective vendors.”

Post a Comment for "MELTDOWN and SPECTRE Threatened Security Vulnerabilities in Processors DO THIS TIP!"