• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

HP Fixes Flaws in Software Update

malware

New Member
Joined
Nov 7, 2004
Messages
5,422 (0.75/day)
Location
Bulgaria
Processor Intel Core 2 Quad Q6600 G0 VID: 1.2125
Motherboard GIGABYTE GA-P35-DS3P rev.2.0
Cooling Thermalright Ultra-120 eXtreme + Noctua NF-S12 Fan
Memory 4x1 GB PQI DDR2 PC2-6400
Video Card(s) Colorful iGame Radeon HD 4890 1 GB GDDR5
Storage 2x 500 GB Seagate Barracuda 7200.11 32 MB RAID0
Display(s) BenQ G2400W 24-inch WideScreen LCD
Case Cooler Master COSMOS RC-1000 (sold), Cooler Master HAF-932 (delivered)
Audio Device(s) Creative X-Fi XtremeMusic + Logitech Z-5500 Digital THX
Power Supply Chieftec CFT-1000G-DF 1kW
Software Laptop: Lenovo 3000 N200 C2DT2310/3GB/120GB/GF7300/15.4"/Razer
HP has fixed flaws in a patch-management program bundled with its computers, printers and other hardware that could be used by hackers to 'brick' HP or Compaq PCs. In an alert sent to customers who subscribe to its security warning service, HP said users should run Software Update to patch the flaws disclosed last week by a Polish researcher known only by his alias, 'porkythepig'. A pair of bugs in the update service's ActiveX control can be used to execute remote code or gain additional access rights, porkythepig said then. He also posted proof-of-concept exploit code that showed how to use one of the vulnerabilities to overwrite and corrupt crucial Windows' system files, an attack that would leave any affected PC unbootable. That would essentially 'brick' the system, since many HP and Compaq PCs do not include a restore CD or DVD, but instead place operating system and application restore files on the hard drive. HP's advisory on Friday instructed users to run Software Update on any machine that has the application, even if the update service is never used. Running Update presumably disables the flawed ActiveX control by fixing the Windows registry.

View at TechPowerUp Main Site
 

macenroe0

New Member
Joined
Jan 14, 2008
Messages
1 (0.00/day)
Buffer overflows, insecure browsers, remote code execution, all common terms in the world of software security. We are surrounded by insecure applications and the big guns are not doing a thing about it. It seems like they are more profitable with insecure software applications than reliable and secure software. Everyone is fed up with the ignorance of giant software companies, but is that enough reason to go public with every security flaw you find in their software?
 
Top