[coreboot] Remote security exploit in all 2008+ Intel platforms

Timothy Pearson tpearson at raptorengineering.com
Mon May 1 19:13:17 CEST 2017


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/01/2017 11:16 AM, persmule wrote:
> 
> We could just remove or cleanse <https://github.com/corna/me_cleaner>
> the ME to seal this loophole.

This particular hole, perhaps.  Do we know that "cleansing" the ME
doesn't simply introduce a bigger hole?  Why are the non-removable bits
so heavily obfuscated, anyway?

The ME is bad news from a security perspective, period.  Security
conscious organisations, or those handling high value data, should not
be using Intel products (unless perhaps they have a signed financial
guarantee of data privacy and integrity from Intel...)

- -- 
Timothy Pearson
Raptor Engineering
+1 (415) 727-8645 (direct line)
+1 (512) 690-0200 (switchboard)
https://www.raptorengineering.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJZB2yrAAoJEK+E3vEXDOFboYUH/i00HzanuLFUOyBJxHt+AFtJ
//nV6o+1h9H7u4RmoH3kQXzIJB8KXhrhkFH0SYIJtrQGswjDMPp0FIpWa/slRwym
NqmaTKKpBivJzfBHTv/UQJ0tp4IddVuhyF8eKvDb6R/hM76RlFGsQ4aZoqq88UD4
ZzizORd1ktmO8Qe2waxYds9Mi8pUj/wGyjOdGFWEbOs0Syw/k1azSsng+8wR72y1
Fn37VMku/GChTM6bjw1zrObUVOm77QO5FD/5OqvC8H+ruyTqSPHwunUUd+z6DGby
Bw0ZKidi0+kqhPiPY76duEhVDkaiy9YinH66p5EQW4B5bJGNn03lhSJERnR5jVc=
=9hlc
-----END PGP SIGNATURE-----



More information about the coreboot mailing list