Jump to content



Rootkit vulnerability in Intel CPUs


Reaper

Recommended Posts

http://www.networkworld.com/community/node/39825?t51hb

A couple of insecurity researchers are about to release a research paper and exploit code for an SMM (System Management Mode) rootkit, that uses an Intel CPU caching vulnerability to install.

Joanna Rutkowska and Loic Duflot claim this is the scariest, stealthiest, and most dangerous rootkit ever. It installs and hides in the SMM space, which is off limits to any OS, thus making it impervious to security measures.

What's worse the SSM has been around since the time of Intel's 386 CPUs, when the Berlin Wall was not a tourist attraction, but rather a place you visited if you wanted to put an end to your misery. The researchers claim Intel has been aware of the issue since 2005, but has done nothing to fix it.

There is no way to combat the threat, or even know if someone is already messing with your PC. So, relax, we can't do anything about it, or even know if it's there.

Originally Posted by Fudzilla

"The researchers claim Intel has been aware of the issue since 2005....."

:cool:

edit: καποιος να διορυωσει τον τιτλο "..vulnerability"

http://en.wikipedia.org/wiki/System_Management_Mode

Link to comment
Share on other sites

lol Fud, άρχισαν πάλι τα αμερικάνικα scare-tactics: "OMG μετανοείτε, έφτασε η ώρα της κρίσης!".

Αν υπήρχε τρόπος να το εκμεταλλευτεί κάποιος από της εποχή των επεξεργαστών 386, πιστεύετε ότι δεν θα το είχε κάνει; ;)

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Δημιουργία...

Important Information

Ο ιστότοπος theLab.gr χρησιμοποιεί cookies για να διασφαλίσει την καλύτερη εμπειρία σας κατά την περιήγηση. Μπορείτε να προσαρμόσετε τις ρυθμίσεις των cookies σας , διαφορετικά θα υποθέσουμε ότι είστε εντάξει για να συνεχίσετε.