The article said this exploit is OS-independent, though, if I read it right. So 
regular user vs. admin wouldn't make a difference.

Or am I totally confused?



John Hornbuckle
MIS Department
Taylor County School District
318 North Clark Street
Perry, FL 32347

www.taylor.k12.fl.us





-----Original Message-----
From: Ben Scott [mailto:[email protected]] 
Sent: Thursday, March 19, 2009 11:17 AM
To: NT System Admin Issues
Subject: Re: Rut roh Raggy: Exploit code targeting major Intel chip flaw to be 
posted 3/19/09

On Thu, Mar 19, 2009 at 11:05 AM, Micheal Espinola Jr
<[email protected]> wrote:
> http://www.networkworld.com/community/node/39825?netht=rn_031809&nladname=031809

  Details are rather sketchy, but it does sound ominous.

  This caught my eye:

  "... privilege escalation from Ring 0 to the SMM ..."

  Sounds like yet another reason to run as an regular user, not with
administrator rights.  (Ring 0 being supervisor mode on i386; Ring 3
is user mode, IIRC.)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to