Linked by Thom Holwerda on Thu 11th May 2006 15:50 UTC, submitted by anonymous
Privacy, Security, Encryption A feature called System Management Mode included in modern x86 cpus opens the way to the land of kernel space and the quest for ring zero. Federico Biancuzzi interviews French researcher Loc Duflot to learn about the System Management Mode attack, how to mitigate it, what hardware is vulnerable, and why we should be concerned with recent X Server bugs.
Permalink for comment 123545
To read all comments associated with this story, please click here.
RE[3]: Great article!
by ivans on Thu 11th May 2006 18:23 UTC in reply to "RE[2]: Great article!"
ivans
Member since:
2005-12-03

All operating systems running on x86 suffer from hardware vulnerabilities on the x86-platform. It takes a moron to believe otherwise.

No, it takes a moron to think this is x86 bug, when in fact it is an OS-level design flaw.

Windows does not suffer from this particular X Server bug because Windows does not use the X Server.

Windows does not suffer from this particular design flaw because it denies any user-mode (ring3) PIO access via EFLAGS.IOPL field. X Server is just an example - it could be any other app.

However, one cannot conclude on that background that Windows isn't vulnerable to hardware bugs.

I never claimed it wasn't. This is not a hardware bug.

Edited 2006-05-11 18:27

Reply Parent Score: 2