Hi! Оттуда же коммент: This is certainly a scary prospect, but the exploit apparently needs Ring 0 access, which basically means compromising the operating system's kernel. As long as your OS's kernel is (mostly) secure (read Mac OS X, Linux, BSD, etc.), there should be little worry about privelege escalation. I suspect that this vulnerability will only be really dangerous on Windows... On Fri, Mar 20, 2009 at 10:34:10AM +0200, Vladimir Sharun writes: VS> Panic? VS> By Yapa (not verified) on Thu, 03/19/2009 - 11:42am. VS> Most new (less than 2 year old) machines already lock the SMRAM register VS> in the bios, therefore preventing access to the SMM. VS> The OS could also prevent access to the SMM by locking the SMRAM VS> register early in the boot process, preventing access. VS> The complexity of such a "root-kit" and writing the low level drivers VS> for use in SMM greatly reduce an outbreak of this threat. VS> Bit too late. VS> On 20.03.2009 10:23, Dmitry Kiselev wrote:
Добрый день!
http://www.networkworld.com/community/node/39825?page=3&nlhtsec=rn_031909&nladname=031909
ого
-- Паша.