[Secure-testing-team] how to handle SMM attacks?

Michael S Gilbert michael.s.gilbert at gmail.com
Mon Aug 10 05:38:20 UTC 2009


On Mon, Aug 10, 2009 at 1:25 AM, Florian Weimer wrote:
> * Michael S. Gilbert:
>
>> any thoughts on how to address SMM (System Management Mode) attacks?
>> this code resides in the vulnerable motherboard's bioses, and hence
>> outside of the os.
>
> It's really not much different than flashable components of any other
> kind (NIC or disk firmware).  The aproach may be new, but the dangers
> aren't.

right, but debian now has almost all free software firmwares for those
devices, and hence those threats are mostly nullified, right?

i think one of the key problems is that SMM updates can be initiated
by the remote attacker without authentication; in fact this is
intentional to be able to track stolen laptops.  the solution proposed
to the vendor is in fact an authentication mechanism, but asus hasn't
responded, which is very very disappointing, but tends to be the case
in the hardware industry, so isn't unexpected.

mike



More information about the Secure-testing-team mailing list