Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
AMD Graphics Microsoft Security Windows

AMD/ATI Video Drivers: Unsafe At Any Speed 261

An anonymous reader writes "CERT/CC has called out AMD for having insecure video drivers. AMD/ATI video drivers are incompatible with system-wide ASLR. 'Always On' DEP combined with 'Always On' ASLR are effective exploit mitigations. However, most people don't know about 'Always On' ASLR since Microsoft had to hide it from EMET with an 'EnableUnsafeSettings' registry key — because AMD/ATI video drivers will cause a BSOD on boot if 'Always On' ASLR is enabled."
This discussion has been archived. No new comments can be posted.

AMD/ATI Video Drivers: Unsafe At Any Speed

Comments Filter:
  • The story is about DEP and ASLR effectiveness at blocking exploits. IT has nothing to do with the title or the ATI/AMD aspect.

    The CERT article mentions it, and it mentions it in that you cannot use the DEP/ASLR protections (in the kernel) because ATI/AMD make an incompatible driver. And since graphics drivers are kernel things, loading them means the kernel must disable DEP/ASLR, making your machine just that much less secure because of it.

  • Re:AOD (Score:5, Informative)

    by noh8rz3 ( 2593935 ) on Thursday June 07, 2012 @01:39PM (#40246857)

    aslr = a way to secure your memory so it's harder for malware to run attacks.
    EMET = a bunch of tools that windows uses to secure the machine. aslr is one of these tools
    bsod = blue screen of death. your computer is frozen
    AMD = a company that was formerly known for making computer chips, but is now in the graphics card business
    ATI = a graphics card manufacturer that AMD bought.
    DEP = another tool in the EMET toolkit.
    cert/cc = an organization that is viewed as an authority on computer stuff.

    in short, AMD drivers suck so much that microsoft has to override its own computer protections to keep AMD from crashing your machine. so the drivers are not just unstable, they make your machine more vulnerable to malware. cert says, "epic fail".

  • Re:ASLR (Score:5, Informative)

    by blackraven14250 ( 902843 ) on Thursday June 07, 2012 @03:21PM (#40248213)
    Better to prevent yesterday's attacks at all than to leave the hole open for all time...
  • by TeknoHog ( 164938 ) on Thursday June 07, 2012 @03:44PM (#40248461) Homepage Journal

    $ lsmod | grep fglrx; uptime
    fglrx 3029147 144
    agpgart 26120 3 intel_gtt,intel_agp,fglrx
    22:41:37 up 76 days, 4:30, 8 users, load average: 0.00, 0.01, 0.05

  • by Anonymous Coward on Thursday June 07, 2012 @03:44PM (#40248479)

    ... you failed to mention that. Oh, right. Your goal was to be sensational. Carry on.

  • Re:AOD (Score:4, Informative)

    by Mr 44 ( 180750 ) on Thursday June 07, 2012 @05:17PM (#40249823)

    Uhh, no. Windows DLLs have always been relatively addressed, and are capable of being loaded at different locations in the virtual address space (google "rebasing"). However, for performance reasons, most DLLs specify a preferred address the loader will attempt to slot them into. All system DLLs specify this, which results in their routines being loaded at predictable addresses (even across machines).

    ASLR means that, on boot, a different location is chosen in the virtual address space to load DLLs into, so that system routines are not always at the same location, making certain types of security exploitation significantly harder.

If you want to put yourself on the map, publish your own map.

Working...