On Thu, 11 May 2006 12:00:40 +0200, "Ed White" <[EMAIL PROTECTED]>
said:
> A researcher of the french NSA discovered a scary vulnerability in modern
> x86 
> cpus and chipsets that expose the kernel to direct tampering.
> 
> http://www.securityfocus.com/print/columnists/402
> 
> The problem is that a feature called System Management Mode could be used
> to 
> bypass the kernel and execute code at the highest level possible: ring
> zero.
> 
> The big problem is that the attack is possible thanks to the way X
> Windows is 
> designed, and so the only way to eradicate it is to redesign it, moving
> video 
> card driver into the kernel, but it seems that this cannot be done also
> for 
> missing drivers and documentation!
> 
> This is another example of insecurity that cannot be fixed because of 
> unresponsible vendors...

This has been disscused;

http://marc.theaimsgroup.com/?l=openbsd-misc&m=114657401630096&w=2

If I understand correctly from what I've been told, this is not a
hardware
issue but an 'X' issue.

-- 
  Eric Furman
  [EMAIL PROTECTED]

Reply via email to