On Wed, Mar 25, 2009 at 08:11:41AM +0100, Didier Wiroth wrote:
> Hello,
> I've read this a few minutes ago. I'm not a developer, nor a security 
> specialist so I was wondering if that is a serious issue for Openbsd.
> http://i.zdnet.com/blogs/core_bios.pdf
> As far as I understood, they mention the "Openbsd shadow files" as being 
> vulnerable/exploitable to these kind of attacks, have a look at Page 17.
> Kind regards,
> Didier

That the BIOS can be patched to run arbitrary code isn't new at all
(Think DOS virii, there was even a switch in older bioses that
prevented flashing and sometimes boot sector writing).
The Core guys "just" produced a nice POC and - to get more attention,
demonstrated that it "os-independent" really means that it also works
with OpenBSD.

Overall, nice work but this really has nothing to do with operating
systems. These are flaws in the x86 hardware architecture introduced by
Intel and various other vendors.

Reply via email to