summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorhellekin <hellekin@dyne.org>2016-08-12 09:48:49 +0000
committerhellekin <hellekin@dyne.org>2016-08-12 09:48:49 +0000
commit9706292e47ad2848df54c32de51136bf046e18ee (patch)
treed9ab7c67ca5a7cc106a33845f507a09732ba3bd8
parent711961eec2a8bec5c913e4b6d5a8184ac9f123e8 (diff)
downloadwww-9706292e47ad2848df54c32de51136bf046e18ee.tar.gz
www-9706292e47ad2848df54c32de51136bf046e18ee.tar.bz2
www-9706292e47ad2848df54c32de51136bf046e18ee.zip
Missed one correction by Joerg
-rw-r--r--content/0022-about-the-asn.1-vulnerability.html17
1 files changed, 9 insertions, 8 deletions
diff --git a/content/0022-about-the-asn.1-vulnerability.html b/content/0022-about-the-asn.1-vulnerability.html
index 24f1403..7418349 100644
--- a/content/0022-about-the-asn.1-vulnerability.html
+++ b/content/0022-about-the-asn.1-vulnerability.html
@@ -4,7 +4,7 @@
<meta charset="UTF-8" name="charset"><!-- pelican??? -->
<title> About the ASN.1 Vulnerability</title>
<meta name="date" content="2016-08-12 10:00:00">
- <meta name="last modified" content="2016-08-12 10:00:00">
+ <meta name="last modified" content="2016-08-12 11:47:00">
<meta name="keywords" content="neo900, ASN.1, security, modem separation, GTA0x">
<meta name="authors" content="hellekin">
<meta name="description" content="Neo900 is not vulnerable to ASN.1 vulnerability. Here's why.">
@@ -126,13 +126,14 @@
access to the whole system.</p>
<p>But with Neo900, the attack surface is much reduced, and a
- compromised modem would only be able to subvert
- the <abbr>CPU</abbr> in the presence of subsequent major
- vulnerabilities. As long as there's no proprietary vulnerable
- binary blobs in the Neo900 <abbr title="Application Processor
- Environment">APE</abbr>, we consider the chance of a modem bug
- bubbling up to the rest of the system without a way to control
- it and fix it in software negligible.</p>
+ compromised modem would need yet another major vulnerability in
+ the <abbr title="Universal Serial Bus">USB</abbr> hardware or
+ the (well understood and proven) free kernel driver to subvert
+ the <abbr>CPU</abbr>. As long as there's no proprietary
+ vulnerable binary blobs in the Neo900 <abbr title="Application
+ Processor Environment">APE</abbr>, we consider the chance of a
+ modem bug bubbling up to the rest of the system without a way to
+ control it and fix it in software negligible.</p>
<p>Our exclusive Neo900 design is more valuable than ever!</p>