"Throwhammer" exploit flips bits in RAM only using network packets

Grall

Invisible Member
Legend
Indirect attacks on computer systems are shaping up to be the headache of all times:
https://arstechnica.com/information...-flips-by-sending-network-packets-over-a-lan/

10gbit/s ethernet cards with a feature called RDMA (and rowhammer-sensitive memory) enables attacks on systems using only relatively modest data rates and no local access:

A relevant quote quoted in the article itself:
Imagine an attacker has either rented or compromised a system inside the network. Assuming RDMA support and an RDMA application on the server, Throwhammer can potentially exploit the application by triggering bit flips. This changes the threat model from requiring the attacker to have code execution on the victim (through JavaScript or natively) to merely being able to send network packets to an open port.
 
Back
Top