1 results (0.012 seconds)

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

Multiple unspecified vulnerabilities in Intel system software for Trusted Execution Technology (TXT) allow attackers to bypass intended loader integrity protections, as demonstrated by exploitation of tboot. NOTE: as of 20090107, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. Múltiples vulnerabilidades sin especificar en Intel system software para Trusted Execution Technology (TXT) permite a atacantes remotos evitar las protecciones de integridad del cargador previstas, como se demostró con la explotación de tboot. NOTA: a fecha de 07-01-2009, la única revelación es un pre-aviso impreciso sin información de uso inmediato. • http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczuk http://invisiblethingslab.com/press/itl-press-2009-01.pdf http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.html http://www.securityfocus.com/bid/33119 •