• _edge@discuss.tchncs.de
    link
    fedilink
    arrow-up
    3
    ·
    7 months ago

    There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.

    In short, the adversary requires elevated access to replace a file on the EFI partition. In this case, you should consider the machine compromised with or without this flaw.

    You weren’t hoping that Secure Boot saves your ass, were you?

    • falsem@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      7 months ago

      Yeah, if someone has write access to your boot partition then you’re kind of already screwed.

    • blindsight@beehaw.org
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      7 months ago

      The idea is also that a compromised system will remains compromised after all storage drives are removed.

      • _edge@discuss.tchncs.de
        link
        fedilink
        arrow-up
        1
        ·
        7 months ago

        Yes, that’s my understanding. A normal user cannot do this. (And of course, an attacker shouldn’t not control a local user in the first place.)

        Physical access is also a risk, but physical access trumps everything.