A researcher of the french NSA discovered a scary vulnerability in modern x86 
cpus and chipsets that expose the kernel to direct tampering.

The problem is that a feature called System Management Mode could be used to 
bypass the kernel and execute code at the highest level possible: ring zero.

The big problem is that the attack is possible thanks to the way X Windows is 
designed, and so the only way to eradicate it is to redesign it, moving video 
card driver into the kernel, but it seems that this cannot be done also for 
missing drivers and documentation!

I would like to know if UML barriers could by bypassed using this attack, or 
not. Maybe we will need a patch for the kernel, or for UML, or what?

Any hint is appreciated. 


------------------------------------------------------------------------

The quest for ring 0

by Federico Biancuzzi
2006-05-10

Federico Biancuzzi interviews French researcher Loïc Duflot to learn about 
the System Management Mode attack, how to mitigate it, what hardware is 
vulnerable, and why we should be concerned with recent X Server bugs.
http://www.securityfocus.com/columnists/402



-------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid0709&bid&3057&dat1642
_______________________________________________
User-mode-linux-devel mailing list
User-mode-linux-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel

Reply via email to