igor (ico) wrote,

m$, прЭлЭсТно

With Microsoft's broken Meltdown mitigation in place, apps and users could now read and write kernel memory, granting total control over the system.
This was due to Redmond's engineers accidentally marking the page tables, which describe the computer's memory layout, as readable-writable for usermode programs, allowing normal applications to rejig memory mappings as necessary to freely access kernel virtual memory.

fr. https://www.theregister.co.uk/2018/04/26/total_meltdown_win7_server_2008_exploit/
Tags: it, security
  • Post a new comment


    default userpic

    Your reply will be screened

    Your IP address will be recorded 

    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
  • 1 comment