Find a Question:
Researcher exceeds UEFI code with vulnerability at Gigabyte motherboards
he vulnerability in the UEFI code that a researcher had discovered in the driver ThinkPad laptops from Lenovo, is also on UEFI code from a large number of Gigabyte motherboards. It comes to motherboards with chipsets for Sandy Bridge- to Broadwell processors.
Security researcher Alex James found the vulnerability with the Gigabyte motherboards Z68-UD3H, Z77X-UD5H, Z87MX-D3H and Z97-D3H. Therewith motherboards with chipsets for Intel’s Sandy Bridge to Broadwell hit and James concludes that are much more vulnerable motherboards. The guid of the Gigabyte eufi driver is different from that of the driver of the ThinkPads and HP laptop which proved rather vulnerable.
Besides the motherboard is a laptop found that a vulnerable driver: the Fujitsu LifeBook A574 / H. Presumably, the next time will be more systems were found susceptible to the exploit that security researcher Dmytro Oleksiuk earlier this month published .
It seemed at first to go to code SmmRuntimeManagementCallback () – feature Intel distributed to its 8 Series chipset, but the problem now seems to be more extensive. Through the leak, a system can be adopted and avoid deep layers of security. According to the discoverer of the zero-day flaw is unlikely that attackers actually exploit exploitable.Viewing:-94
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!