RAMBleed is a follow-on to the Rowhammer class of attacks that allows attackers to read memory data on a target Windows computer, without actually accessing the memory itself. Attackers can exploit these cross-process bit flips for a myriad of purposes, including privilege escalation and complete device takeover. Researchers say any system that uses Rowhammer-susceptible dual in-line memory modules (DIMMs) is vulnerable. Users can mitigate their risk by upgrading their memory to DDR4 with targeted row refresh enabled.
Source: https://threatpost.com/rambleed-side-channel-privileged-memory/145629/

