Bugtraq mailing list archives
Re: Intel Pentium Bug
From: bierman () APPLE COM (Peter Bierman)
Date: Sat, 8 Nov 1997 05:08:36 -0800
The following text is forwarded from the member mailing list of the Undergraduate Projects Lab at the University of Wisconsin, Madison:
On Fri, 7 Nov 1997, Chuck McKenzie wrote: <snip>Intel recently acknowledged that they enabled the ability to update microcode on Pentium chips several years ago. That's right folks, they put a backdoor in your hardware. The good news is, it could be used to fix this bug, should Intel be so inclined.Think of the posibilitys... a nice little microcode virus... I don't know how it works... could it be posible to nuke the microcode enough so that a computer wouldn't boot?
From a Usenet post in intel.motherboards.pentium_pro:
Hi, The Pentium(R) Pro processor and Pentium(R) II Processor may contain design defects or errors known as errata that may cause the product to deviate from published specifications. Many times, the effects of the errata can be avoided by implementing hardware or software work-arounds, which are documented in the Pentium Pro Processor Specification Update and the Pentium II Processor Specification Update. Pentium Pro and Pentium II processors include a feature called "reprogrammable microcode", which allows certain types of errata to be worked around via microcode updates. The microcode updates reside in the system BIOS and are loaded into the processor by the system BIOS during the Power-On Self Test, or POST. Intel provides microcode updates to system BIOS developers. System BIOS code on motherboards based on Pentium Pro and Pentium II processors contains microcode updates that are specific to silicon steppings of the processor. Integrators must ensure the update matches the processor stepping being used. When the system BIOS does not contain the microcode update that matches the processor stepping, integrators must install the latest update in the system BIOS before shipping the system. Historically, systems based on the Pentium Pro and Pentium II processors have been updated by upgrading the entire system BIOS with a new revision of system BIOS that contains the correct microcode update. However, such a process may be time consuming when assembling and configuring many systems. Intel has worked closely with BIOS developers to implement a processor update Applications Programming Interface (API), which allows just the microcode update within the system BIOS to be installed as needed. Motherboards that contain a BIOS with the Intel-defined processor update API can be quickly and easily updated with the processor update utility, if required, without need for a complete system BIOS upgrade. This utility is available to members of the IPD, GID and IPI programs only. The latest revision of the PR440FX BIOS includes the latest microcode update for the Pentium Pro processor. The flag erratum will not be corrected by a microcode update. Joe Goldmeer Intel Internet Support
I don't know if this applies to the Pentium and Pentium/MMX chips... -Erik
-- pmb () pez com http://www.mycds.com/pmb/ PGP at http://pgpkeys.mit.edu/ "If you ask your children what they did today in school and they say nothing. We just want to remind you that nothing is really something." -Ohio Education Association
Current thread:
- Re: Intel Pentium Bug, (continued)
- Re: Intel Pentium Bug Ian McWilliam (Nov 08)
- Re: Intel Pentium Bug John Pettitt (Nov 07)
- Sidenote of Pentium Bugs Dave (Nov 07)
- Security bug in iCat Suite version 3.0 Mikael Johansson (Nov 08)
- Re: Intel Pentium Bug JoelKatz (Nov 07)
- Re: Intel Pentium Bug Joe Ilacqua (Nov 07)
- Re: Intel Pentium Bug Rubens Kuhl Jr. (Nov 07)
- Re: Intel Pentium Bug Ralf Baechle (Nov 10)
- Re: Intel Pentium Bug Barry Irwin (Nov 08)
- Re: Intel Pentium Bug Bjorn Wesen (Nov 08)
- Re: Intel Pentium Bug Peter Bierman (Nov 08)
- Re: Intel Pentium Bug Aleph One (Nov 08)
- Microsoft Office security bug Aleph One (Nov 07)
- Re: Microsoft Office security bug Inigo Gonzalez (Nov 11)
- What were the opcodes to hang a Pentium again? (fwd) Darren Reed (Nov 11)
- Re: Microsoft Office security bug Aleph One (Nov 11)
- Vunerability in Lizards game SUID (Nov 11)
- Re: Vunerability in Lizards game Alex Murray (Nov 12)
- Re: Vunerability in Lizards game Olaf Titz (Nov 13)
- Re: Vunerability in Lizards game Kragen \ (Nov 13)
- Re: Vunerability in Lizards game Neil Levine (Nov 17)
- Microsoft Office security bug Aleph One (Nov 07)