OpenVZ Forum


Home » Mailing lists » Users » SecurityFocus Article
SecurityFocus Article [message #3093] Thu, 11 May 2006 14:51 Go to previous message
Ed White is currently offline  Ed White
Messages: 1
Registered: May 2006
Junior Member
A researcher of the french NSA discovered a scary vulnerability in modern x86 cpus and chipsets that expose the kernel to direct tampering.

The problem is that a feature called System Management Mode could be used to bypass the kernel and execute code at the highest level possible: ring zero.

The big problem is that the attack is possible thanks to the way X Windows is designed, and so the only way to eradicate it is to redesign it, moving video card driver into the kernel, but it seems that this cannot be done also for missing drivers and documentation!

I would like to know if OpenVZ barriers could be bypassed using this attack, or not. Maybe we will need a patch for the kernel, or for OpenVZ itself, or what?

Any hint is appreciated.


------------------------------------------------------------ ------------

The quest for ring 0

by Federico Biancuzzi
2006-05-10

Federico Biancuzzi interviews French researcher Loïc Duflot to learn about the System Management Mode attack, how to mitigate it, what hardware is vulnerable, and why we should be concerned with recent X Server bugs.
http://www.securityfocus.com/columnists/402
 
Read Message
Read Message
Read Message
Previous Topic: can access vps from server not from network
Next Topic: Dhcp Networking -net-dev_add Confusion
Goto Forum:
  


Current Time: Mon Nov 18 13:56:37 GMT 2024

Total time taken to generate the page: 0.03713 seconds