"There are many ways to get code into the EFI environment. An attacker
can modify the bootlader directly, modify bootloader varibles in
NVRAM, modify and reflash firmware or exploit an implementation flaw
in the driver.

Nothing specific to EFI here, as far as I can see.  All of this is
true as well for traditional BIOS, Open Firmware, and even coreboot.


Segher


--
coreboot mailing list
[email protected]
http://www.coreboot.org/mailman/listinfo/coreboot

Reply via email to