While I sometimes use the arguments “in such case e, attacker gains nothing, 
because it assumes you are already compromised”, one has to be careful with 
this, because compromise doesn't imply a total compromise.

A simple example (unrelated to ME) of this catch: One might think that giving 
user full permissions for all the files does not decrease the security if the 
user can simply sudo anything. While this is not mostly true when considering 
RCE vulnerabilities (or running a trojan), it doesn't apply to 
path-traversal-like vulnerability – attacker is not automatically in the 
position where she can simply call sudo.

I don't know ME well, but maybe this catch also applies to ME. Note that whole 
ME includes not only some persistently running chip and its firmware, it also 
includes some (optional) software for the OS, which is BTW actually recommended 
to be removed by the Intel's security advisory. I don't know what is it exactly 
capable of, it can probably give the admin access to OS shell, and maybe 
something more. (And BTW, you can see it in dom0 by lsmod.) This just 
illustrates that ME is actually a complex beast and it's hard to properly 
reason about it.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/781d1b38-ec21-40c8-9779-e09f83059462%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to