lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 3 Mar 2016 22:14:39 +0000
From: HP Security Alert <hp-security-alert@...com>
To: Undisclosed recipients: ;
Subject: [security bulletin] HPSBHF03439 rev.1 - HP Commercial PCs with Sure
 Start, Local Denial of Service

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:
https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05012469
Version: 1

HPSBHF03439 rev.1 - HP Commercial PCs with Sure Start, Local Denial of Service
NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.

Release Date: 2016-02-25
Last Updated: 2016-02-26

Potential Security Impact: Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY

HP has identified a potential security vulnerability with the Sure Start
implementation on certain 2015 commercial platforms. This vulnerability could
be exploited locally by administrator or root level privileges and if
compromised, the Sure Start systems could fail to recover the BIOS.

References:

  * CVE-2016-2243
  * PSRT110027

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Commercial Notebook, Desktop, and Workstation versions See the tables in the
vulnerability resolution for the impacted products.

BACKGROUND

For a PGP signed version of this security bulletin please write to:
security-alert@...com

For a PGP signed version of this security bulletin please write to:
hp-security-alert@...com

CVSS 2.0 Base Metrics
================================================================================
Reference                      Base Vector                   Base Score
CVE-2016-2243        (AV:L/AC:L/Au:N/C:P/I:C/A:P)               6.1
================================================================================
Information on CVSS is documented in HP Customer Notice: HPSN2008002.

RESOLUTION

HP has made the following product updates available for the impacted products.

To acquire the firmware updates, go to http://www.hp.com

 1. Select Support and then Download Drivers.

 2. Enter your product name or number in the Find my product field.

 3. Choose the product from the returned search.

 4. Choose the operating system.

 5. Under the Download Index, select BIOS, and download the BIOS version as
    listed in the table below. Follow the installation instructions to install
    the firmware update.

   Series                Product name              BIOS Version   Win Softpaq

ZBook         HP ZBook 15 G3 & ZBook 17 G3         1.03           SP74756

ZBook         HP ZBook 15u G3                      1.03           SP74756

ZBook         HP ZBook Studio G3                   1.04           SP74757

1000 Series   HP EliteBook Folio 1040 G3           1.01           SP74768

1000 Series   HP EliteBook Folio 1012 x2 G2        1.1            SP74770

1000 Series   HP EliteBook 840 G3                  1.04           SP74748

1000 Series   HP EliteBook 850 G3                  1.04           SP74748

1000 Series   HP EliteBook 820 G3                  1.04           SP74748

700 series    HP Elitebook 745 G3                  1.08           SP74691

700 series    HP Elitebook 755 G3                  1.08           SP74691

700 series    HP Elitebook 725 G3                  1.08           SP74691

700 series    HP mt42 Mobile Thin Client           1.05           SP74761

800 series    HP EliteDesk 800 G2 TWR              2.09           SP74661

800 series    HP EliteDesk 800 G2 DM               2.1            SP74666

800 series    HP mp9 G2 Retail System              2.1            SP74666

800 series    HP EliteDesk 800 SFF                 2.09           SP74661

800 series    HP EliteOne 800 G2 23-in T/NT        2.1            SP74680

700 series    HP EliteDesk 705 G2 MT/SFF           2.09           SP74655

700 series    HP EliteDesk 705 G2 DM               2.05           SP74677

700 series    HP EliteOne 705 G2 23in AiO T/NT     2.07           SP74686

           Product name              BIOS Version  Win Softpaq  Linux Softpaq

HP Z240 Tower Workstation N51        01.11         SP74759      SP74760

HP Z240 SFF Workstation N51          01.11         SP74759      SP74760

HP Z238 Microtower Workstation N51   01.11         SP74759      SP74760

System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current secure
solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the
attention of users of the affected HP products the important security
information contained in this Bulletin. HP recommends that all users determine
the applicability of this information to their individual situations and take
appropriate action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP will not be
responsible for any damages resulting from user's use or disregard of the
information provided in this Bulletin. To the extent permitted by law, HP
disclaims all warranties, either express or implied, including the warranties
of merchantability and fitness for a particular purpose, title and
non-infringement."

REVISION HISTORY

Version:1 (rev.1)  10 February 2016 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send email to hpsecurityalert@...com

Report: To report a potential security vulnerability with any HP supported
product, send email to: hpsecurityalert@...com

Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email: http://support.hp.com/us/en/subscribe/

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
secBullArchive

Software Product Category: The Software Product Category is represented in the
title by the two characters following HPSB.

PI = HP Printing and Imaging
HF = HP Hardware and Firmware
ST = HP Storage Software
GN = HP General Software

Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: hp-security-alert@...com It is strongly recommended
that security related information being communicated to HP be encrypted using
PGP, especially exploit information.
To get the securityalert PGP key, please send an email message as follows:
To: hpsecurityalert@...com
Subject: get key

Products: HP ZBook 15 G3 & ZBook 17 G3, HP ZBook 15u G3, HP ZBook Studio G3, HP
EliteBook Folio 1040 G3, HP EliteBook Folio 1012 x2 G2, HP EliteBook 840 G3, HP
EliteBook 850 G3, HP EliteBook 820 G3, H Elitebook 745 G3, HP Elitebook 755 G3,
HP Elitebook 725 G3, HP mt42 Mobile Thin Client, HP EliteDesk 8, HP Z240 Tower
Workstation N51, HP Z240 SFF Workstation N51, HP Z238 Microtower Workstation
N51

Copyright 2016 Hewlett-Packard Development Company, L.P.

Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or its
affiliates, subcontractors or suppliers will be liable for incidental,special
or consequential damages including downtime cost; lost profits;damages relating
to the procurement of substitute products or services; or damages for loss of
data, or software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard Company in the
United States and other countries. Other product and company names mentioned
herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Ftsm
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ