The article said this exploit is OS-independent, though, if I read it right. So regular user vs. admin wouldn't make a difference.
Or am I totally confused? John Hornbuckle MIS Department Taylor County School District 318 North Clark Street Perry, FL 32347 www.taylor.k12.fl.us -----Original Message----- From: Ben Scott [mailto:[email protected]] Sent: Thursday, March 19, 2009 11:17 AM To: NT System Admin Issues Subject: Re: Rut roh Raggy: Exploit code targeting major Intel chip flaw to be posted 3/19/09 On Thu, Mar 19, 2009 at 11:05 AM, Micheal Espinola Jr <[email protected]> wrote: > http://www.networkworld.com/community/node/39825?netht=rn_031809&nladname=031809 Details are rather sketchy, but it does sound ominous. This caught my eye: "... privilege escalation from Ring 0 to the SMM ..." Sounds like yet another reason to run as an regular user, not with administrator rights. (Ring 0 being supervisor mode on i386; Ring 3 is user mode, IIRC.) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
