Donate to Remove ads

Got a credit card? use our Credit Card & Finance Calculators

Thanks to Wasron,jfgw,Rhyd6,eyeball08,Wondergirly, for Donating to support the site

Rather important security alert

Seek assistance with all types of tech. - computer, phone, TV, heating controls etc.
GrahamPlatt
Lemon Quarter
Posts: 2093
Joined: November 4th, 2016, 9:40 am
Has thanked: 1041 times
Been thanked: 847 times

Rather important security alert

#632630

Postby GrahamPlatt » December 8th, 2023, 5:14 pm

LogoFail. All UEFI based systems vulnerable.
I don’t know how the malicious actors are going to get their version of the OS vendors Logo onto your system in the first place mind.

https://arstechnica.com/security/2023/1 ... re-attack/

UncleEbenezer
The full Lemon
Posts: 10818
Joined: November 4th, 2016, 8:17 pm
Has thanked: 1472 times
Been thanked: 3007 times

Re: Rather important security alert

#632685

Postby UncleEbenezer » December 8th, 2023, 8:26 pm

GrahamPlatt wrote:I don’t know how the malicious actors are going to get their version of the OS vendors Logo onto your system in the first place mind.

US lawful intercept legislation?

As (IIRC) revealed in connection with thrangrycat (but buried under the much bigger shock revelation of Pegasus the same day), the spooks have the right to get their hands on your hardware before you do, at least if you are in the US or your supplier values its business there. Though that was specifically routers.

Infrasonic
Lemon Quarter
Posts: 4491
Joined: November 4th, 2016, 2:25 pm
Has thanked: 648 times
Been thanked: 1266 times

Re: Rather important security alert

#632741

Postby Infrasonic » December 9th, 2023, 9:12 am

https://www.coreboot.org/users.html

Security
coreboot comes with a minimal Trusted Computing Base which reduces the general attack surface. It also supports a secure boot process called VBOOT2. It’s written in MISRA-C standard and provides other languages like Ada for formal verification of special properties. Also the use of platform features like IOMMU, flash protections and deactivated SMM mode increases the security as well.
Cont.

Be interesting to see if Coreboot and its variants are resistant to this firmware issue...

Urbandreamer
Lemon Quarter
Posts: 3193
Joined: December 7th, 2016, 9:09 pm
Has thanked: 357 times
Been thanked: 1053 times

Re: Rather important security alert

#632840

Postby Urbandreamer » December 9th, 2023, 4:58 pm

Infrasonic wrote:https://www.coreboot.org/users.html

Security
coreboot comes with a minimal Trusted Computing Base which reduces the general attack surface. It also supports a secure boot process called VBOOT2. It’s written in MISRA-C standard and provides other languages like Ada for formal verification of special properties. Also the use of platform features like IOMMU, flash protections and deactivated SMM mode increases the security as well.
Cont.

Be interesting to see if Coreboot and its variants are resistant to this firmware issue...


Looking into the details it's likely that Coreboot et-al would be resistant.

In essence the exploit entails replacing a customizable graphical image with one that overflows the buffer.
Move to firmware where the image is embedded or size checked and the exploit won't work.

https://palantetech.coop/blog/palante-s ... y-logofail

chas49
Lemon Quarter
Posts: 1991
Joined: November 4th, 2016, 10:25 am
Has thanked: 221 times
Been thanked: 473 times

Re: Rather important security alert

#632878

Postby chas49 » December 9th, 2023, 9:27 pm

I don't profess to understand a lot of the detail here, but this quote from the article seemed a bit glib:

The best way to prevent LogoFAIL attacks is to install the UEFI security updates that are being released as part of Wednesday’s coordinated disclosure process. Those patches will be distributed by the manufacturer of the device or the motherboard running inside the device.


Given that the way in which this vulnerability could be exploited is by installing a fake firmware update, this palces a lot of trust in making sure you are getting your firmware update from the right place (or that they haven't been compromised).

UncleEbenezer
The full Lemon
Posts: 10818
Joined: November 4th, 2016, 8:17 pm
Has thanked: 1472 times
Been thanked: 3007 times

Re: Rather important security alert

#632899

Postby UncleEbenezer » December 10th, 2023, 12:28 am

chas49 wrote:I don't profess to understand a lot of the detail here, but this quote from the article seemed a bit glib:

The best way to prevent LogoFAIL attacks is to install the UEFI security updates that are being released as part of Wednesday’s coordinated disclosure process. Those patches will be distributed by the manufacturer of the device or the motherboard running inside the device.


Given that the way in which this vulnerability could be exploited is by installing a fake firmware update, this palces a lot of trust in making sure you are getting your firmware update from the right place (or that they haven't been compromised).

If your system installs *any* updates that aren't cryptographically signed by a fully trusted source, you're asking for trouble.


Return to “Technology - Computers, TV, Phones etc.”

Who is online

Users browsing this forum: No registered users and 28 guests