logoalt Hacker News

rtpgyesterday at 1:16 AM4 repliesview on HN

This is super bad right? Like anybody who has this running will be vulnerable to a super basic HTTP redirect -> installer running on their machine attack, right? And on top of that it's for something that is likely installed on _so many_ machines, right?

I don't think I've ever seen something this exploitable that is so prevalent. Like couldn't you just sit in an airport and open up a wifi hotspot and almost immediately own anyone with ATI graphics?


Replies

ramon156yesterday at 7:26 PM

You can get arrested for this in my country, fun fact.

I guess that's how you prevent anything, just make it illegal and the exploit becomes an unintended illegal feature, like occupying the low-freq radio signal.

ano-theryesterday at 10:57 AM

Not that this isn’t bad, doesn’t this only apply when an update is available?

So you have to be on a shady hotspot, without VPN, AMD has recently published an update, and your update scheduler is timed to run.

That would be a little less than “immediately own anyone with ATI”.

show 3 replies
dbtablesorrowsyesterday at 6:54 AM

Who would connect to unknown person's hotspot?

But it seems pretty trivial for some bad actor at local ISP.

show 2 replies
hulituyesterday at 6:31 AM

> Like couldn't you just sit in an airport and open up a wifi hotspot and almost immediately own anyone with ATI graphics?

Some of us do not enable automatic updates (automatic updates are the peak of stupidity since Win98 era). And, when you sit in an airport, you don't update all your programs.

show 1 reply