Bottomley: Owning your Windows 8 UEFI Platform
Bottomley: Owning your Windows 8 UEFI Platform
Posted Feb 18, 2013 19:53 UTC (Mon) by hummassa (guest, #307)In reply to: Bottomley: Owning your Windows 8 UEFI Platform by dsommers
Parent article: Bottomley: Owning your Windows 8 UEFI Platform
No, it doesn't, and the proof for that is Apple's products jailbreaks. One of them used a simple crafted PDF that subverted the "secure boot" infrastructure.
> That attack vector has not been used as much as it was during the DOS times,
This has a reason: while it may be practical in an embedded and usually homogeneous environment, in a standard-PC env, the attacker must have code to read every one of the one hundred different filesystems if he wants to compromise the system via boot. IOW, the attacker must be an entire OS.
> where BIOS vendors after a while added features to block writes to the boot sector.
This had not detained nor even slowed down malware at that time (yes, I am that old) and it was considered just a nuisance because it difficulted NECESSARY system updates; you know, to patch vulnerabilities &c... Many, many people turned this off in BIOS. Ah, and once you entered another OS, this was not effective because the other OS bypassed BIOS and talked directly to the hardware. THAT is the reason this is not in effect in today's PCs...
> Secure boot ensures that the core OS loaded is unmodified.
Yes. But from a security standpoint, this would ONLY be a good thing if the core OS loaded was PROVEN secure. If you load a swiss cheese of vulnerabilities, unmodified, this is a BAD thing.
> Which can even be seen as an extension of this old "don't write to boot sector" feature.
Yes. Equally uneffective, equally a nuisance, equally time-consuming for no good reason.
