Добрый день! http://www.networkworld.com/community/node/39825?page=3&nlhtsec=rn_031909&nladname=031909 ого -- Dmitry Kiselev
Panic? By Yapa (not verified) on Thu, 03/19/2009 - 11:42am. Most new (less than 2 year old) machines already lock the SMRAM register in the bios, therefore preventing access to the SMM. The OS could also prevent access to the SMM by locking the SMRAM register early in the boot process, preventing access. The complexity of such a "root-kit" and writing the low level drivers for use in SMM greatly reduce an outbreak of this threat. Bit too late. On 20.03.2009 10:23, Dmitry Kiselev wrote:
Добрый день!
http://www.networkworld.com/community/node/39825?page=3&nlhtsec=rn_031909&nladname=031909
ого
Hi! Оттуда же коммент: This is certainly a scary prospect, but the exploit apparently needs Ring 0 access, which basically means compromising the operating system's kernel. As long as your OS's kernel is (mostly) secure (read Mac OS X, Linux, BSD, etc.), there should be little worry about privelege escalation. I suspect that this vulnerability will only be really dangerous on Windows... On Fri, Mar 20, 2009 at 10:34:10AM +0200, Vladimir Sharun writes: VS> Panic? VS> By Yapa (not verified) on Thu, 03/19/2009 - 11:42am. VS> Most new (less than 2 year old) machines already lock the SMRAM register VS> in the bios, therefore preventing access to the SMM. VS> The OS could also prevent access to the SMM by locking the SMRAM VS> register early in the boot process, preventing access. VS> The complexity of such a "root-kit" and writing the low level drivers VS> for use in SMM greatly reduce an outbreak of this threat. VS> Bit too late. VS> On 20.03.2009 10:23, Dmitry Kiselev wrote:
Добрый день!
http://www.networkworld.com/community/node/39825?page=3&nlhtsec=rn_031909&nladname=031909
ого
-- Паша.
Fri, Mar 20, 2009 at 11:32:03, gul wrote about "Re: [uanog] new security flaw":
This is certainly a scary prospect, but the exploit apparently needs Ring 0 access, which basically means compromising the operating system's kernel.
As long as your OS's kernel is (mostly) secure (read Mac OS X, Linux, BSD, etc.), there should be little worry about privelege escalation.
I suspect that this vulnerability will only be really dangerous on Windows...
Мой коллега говорит, что ему показывали этот эксплойт ещё в 2006: на кнопку NMI (есть в Intel, HP брэндах) показывалось окошко с чем-то типа "f*ck off" и ничего больше не происходило. Перезагрузка НЕ лечила. Так что достаточно запустить однажды что-то своё на такой машине, чтобы вредный код сел в firmware (не BIOS!) и дальше оно будет жить. -netch-
participants (4)
-
Dmitry Kiselev
-
Pavel Gulchouck
-
Valentin Nechayev
-
Vladimir Sharun