That's how I interpreted it as well, but I dont know anything about SMM.

--
ME2


On Thu, Mar 19, 2009 at 12:31 PM, John Hornbuckle <
[email protected]> wrote:

> The article said this exploit is OS-independent, though, if I read it
> right. So regular user vs. admin wouldn't make a difference.
>
> Or am I totally confused?
>
>
>
> John Hornbuckle
> MIS Department
> Taylor County School District
> 318 North Clark Street
> Perry, FL 32347
>
> www.taylor.k12.fl.us
>
>
>
>
>
> -----Original Message-----
> From: Ben Scott [mailto:[email protected]]
> Sent: Thursday, March 19, 2009 11:17 AM
> To: NT System Admin Issues
> Subject: Re: Rut roh Raggy: Exploit code targeting major Intel chip flaw to
> be posted 3/19/09
>
> On Thu, Mar 19, 2009 at 11:05 AM, Micheal Espinola Jr
> <[email protected]> wrote:
> >
> http://www.networkworld.com/community/node/39825?netht=rn_031809&nladname=031809
>
>  Details are rather sketchy, but it does sound ominous.
>
>  This caught my eye:
>
>  "... privilege escalation from Ring 0 to the SMM ..."
>
>  Sounds like yet another reason to run as an regular user, not with
> administrator rights.  (Ring 0 being supervisor mode on i386; Ring 3
> is user mode, IIRC.)
>
> -- Ben
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to