Another week, another exploit - this time in Intel's management engine
Rob Seastrom
rs at seastrom.com
Sat May 6 17:04:03 CDT 2017
Affected systems are pretty much all server class machines and *some* consumer machines.
https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/
Exploit details here...
https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf
Sent from my iPad
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.amrad.org/pipermail/tacos/attachments/20170506/2cbc0b0d/attachment.html>
More information about the Tacos
mailing list