top | item 46911359

(no title)

ano-ther | 23 days ago

Not that this isn’t bad, doesn’t this only apply when an update is available?

So you have to be on a shady hotspot, without VPN, AMD has recently published an update, and your update scheduler is timed to run.

That would be a little less than “immediately own anyone with ATI”.

discuss

order

Ginden|23 days ago

You need only a device on network to spam DHCP messages with malware DNS. So you don't need "shady hotspot", only compromised device within network.

pmontra|23 days ago

If somebody is MITMing a target person, they will respond positively to "update available?" calls from that person and then serve the tainted update. The article does not say what the frequency of auto update check is. Let's say one per day. If somebody is targeted it's one day away from RCE.

thedanbob|23 days ago

The update check is HTTPS, only the files themselves are HTTP.

rtpg|23 days ago

Oh yeah fair point, the HTTPS-ness of the first step is a helpful backstop