Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

Re: Intel's Windows Drivers *NOT* Found to Have Serious Flaws

  • Subject: Re: Intel's Windows Drivers *NOT* Found to Have Serious Flaws
  • From: Jim <james@xxxxxxxxxxxxxxxxxxxxxxx>
  • Date: Wed, 14 Jun 2006 13:14:43 GMT
  • In-reply-to: <1150289927.483438.103410@i40g2000cwc.googlegroups.com>
  • Newsgroups: comp.os.linux.advocacy
  • Organization: ntl Cablemodem News Service
  • References: <1374279.LSAvoqrZoM@schestowitz.com> <1150289927.483438.103410@i40g2000cwc.googlegroups.com>
  • User-agent: Mozilla Thunderbird 1.0 (Windows/20041206)
  • Xref: news.mcc.ac.uk comp.os.linux.advocacy:1119222
Larry Qualig wrote:
Roy Schestowitz wrote:

Intel: Driver flaws no major threat--yet

,----[ Quote ]
| Flaws in driver software may be worrisome and a potentially serious
| threat, but security experts at Intel see no need for alarm. At least,
| not yet.
|
| In a recent experiment, researchers at the Santa Clara, Calif.-based
| chipmaker searched for publicly known vulnerabilities in drivers for
| Microsoft's Windows operating system. They also hunted for malicious
| code that took advantage of those security holes. In particular, they
| wanted to find problems in kernel-level drivers and exploits that would
| give an attacker full rein over a vulnerable system.
`----

http://news.zdnet.com/2100-1009_22-6083511.html



The dishonest thread title has been corrected.

<quote>

In a recent experiment, researchers at the Santa Clara, Calif.-based
chipmaker searched for publicly known vulnerabilities in drivers for
Microsoft's Windows operating system. They also hunted for malicious
code that took advantage of those security holes. In particular, they
wanted to find problems in kernel-level drivers and exploits that would
give an attacker full rein over a vulnerable system.

The search came up almost empty.

"It was difficult to find something that was useful for us," David
Schulhoff, a senior information security specialist at Intel, said
Monday in a presentation at the Computer Security Institute's annual
NetSec event. "There really are not that many Windows kernel-mode
driver vulnerabilities out there."

Other security experts agree with Intel's assessment.
</quote>


most that /are/ present tend to manifest themselves immediately with little more than reboot loops and odd crashes (particularly relevant to display drivers) which can usually be fixed by ripping out the driver and installing updated ones, or in the case of graphics cards (particularly NVidia and ATI's), installing Forceware* (aren't unified chip architectures great?).


*ATI has Catalyst, NVidia has Forceware. The NVidia NForce mainboard chipsets also have a unified architecture - the same drivers run NForce2 and NForce4, which makes software developers' job a whole lot easier. Good for x86 console (read: XBox) as well.
--
When all else fails...
Use a hammer.


http://dotware.co.uk

Some people are like Slinkies
They serve no particular purpose
But they bring a smile to your face
When you push them down the stairs.

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index