so someone with root privileges who logs in locally could take over the machine?
I'm guessing local admin is more of a Windows concept. ________________________________ From: aholt...@gmail.com <aholt...@gmail.com> on behalf of Adam Holt <h...@laptop.org> Sent: Monday, October 10, 2016 9:55 AM To: xsce-devel; server-devel Subject: [XSCE] NUCs Vulnerable to SMM Exploit (System Management Mode) "pretty much all NUCs from 2015 and 2016 are vulnerable to this. The issue has been fixed in the BIOS versions that were released earlier in September..." http://nucblog.net/2016/10/security-nucs-vulnerable-to-smm-exploit/ Security Alert: NUCs Vulnerable to SMM Exploit - The NUC Blog<http://nucblog.net/2016/10/security-nucs-vulnerable-to-smm-exploit/> nucblog.net Intel has released on Monday a security advisory regarding a flaw in the Intel NUC BIOS. This flaw allows a user with local administrative right to access the system management mode (SMM) and take... http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html [https://3.bp.blogspot.com/-9H0ehzTKRBY/V_QfMfS-LzI/AAAAAAAALRc/xIuOwXQra2oJvgy1sPzIHsKDb5dkac2zACLcB/w1200-h630-p-nu/nuc.jpg]<http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html> ALERT: Major NUC security flaw<http://www.fanlesstech.com/2016/10/alert-major-nuc-security-flaw.html> www.fanlesstech.com Intel is releasing updated BIOS firmware for a privilege escalation issue. This issue affects Intel NUC Kits listed in the affected produ...
_______________________________________________ Server-devel mailing list Server-devel@lists.laptop.org http://lists.laptop.org/listinfo/server-devel