Another week, another exploit - this time in Intel's management engine

Rob Seastrom rs at seastrom.com
Sat May 6 17:04:03 CDT 2017


Affected systems are pretty much all server class machines and *some* consumer machines. 

https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/

Exploit details here...

https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf


Sent from my iPad
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.amrad.org/pipermail/tacos/attachments/20170506/2cbc0b0d/attachment.html>


More information about the Tacos mailing list