Mitigating Iguana Meltdown and Spectre Vulnerabilities


Meltdown and Spectre exploit hardware vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer.

Meltdown: Can be used to read sandboxed private kernel memory from an unprivileged user process. Spectre: Can be used to extract info from other running processes

Issue [top]

Meltdown and Spectre can be used to steal data that is processed on a computer.

Cause [top]

  • You are affected if you have an Intel processor released since 1995 with the exception of Itanium and pre-2013 Atoms. A list of vulnerable ARM processors and mitigations is listed No AMD processors were affected.
  • The operating system is responsible for process management and access privileges:

    Iguana is just one of these processes. It is not possible to patch Iguana to fix this.

  • You could be affected to a degree if you are running Intel, ARM, or AMD processors.
  • This post has the specifics
  • One of the more prominent exploits could be stealing login cookies from your browser:

    Iguana is just a running process, and you interact with it via your browser. It is not possible to patch Iguana would to prevent this exploit.

Solution [top]

  • In order to mitigate any risk exposed by this exploit, update your operating system by downloading all recent updates:

    All operating systems (Windows/Linux/macOS) have had patches released since this exploit was found that should protect you. Make sure you download them.

  • If you are running Windows Server, supposedly you need to enable “kernel-user space splitting” after the updates are installed.
  • All major browser vendors have issued patches already update your browsers:

    Everybody has said it doesn’t make it impossible for it to still happen but they have made it exponentially more difficult.

Prevention [top]

Ensure you are running the version of your operating system, and the latest version of your web browser.


Leave A Comment?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.