That's how I interpreted it as well, but I dont know anything about SMM. -- ME2
On Thu, Mar 19, 2009 at 12:31 PM, John Hornbuckle < [email protected]> wrote: > The article said this exploit is OS-independent, though, if I read it > right. So regular user vs. admin wouldn't make a difference. > > Or am I totally confused? > > > > John Hornbuckle > MIS Department > Taylor County School District > 318 North Clark Street > Perry, FL 32347 > > www.taylor.k12.fl.us > > > > > > -----Original Message----- > From: Ben Scott [mailto:[email protected]] > Sent: Thursday, March 19, 2009 11:17 AM > To: NT System Admin Issues > Subject: Re: Rut roh Raggy: Exploit code targeting major Intel chip flaw to > be posted 3/19/09 > > On Thu, Mar 19, 2009 at 11:05 AM, Micheal Espinola Jr > <[email protected]> wrote: > > > http://www.networkworld.com/community/node/39825?netht=rn_031809&nladname=031809 > > Details are rather sketchy, but it does sound ominous. > > This caught my eye: > > "... privilege escalation from Ring 0 to the SMM ..." > > Sounds like yet another reason to run as an regular user, not with > administrator rights. (Ring 0 being supervisor mode on i386; Ring 3 > is user mode, IIRC.) > > -- Ben > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
