[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4bd535b2778743bb842ea7c169b9df3e@G2W6496.auth.hpicorp.net>
Date: Thu, 3 Mar 2016 22:14:39 +0000
From: HP Security Alert <hp-security-alert@...com>
To: Undisclosed recipients: ;
Subject: [security bulletin] HPSBHF03439 rev.1 - HP Commercial PCs with Sure
Start, Local Denial of Service
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05012469
Version: 1
HPSBHF03439 rev.1 - HP Commercial PCs with Sure Start, Local Denial of Service
NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.
Release Date: 2016-02-25
Last Updated: 2016-02-26
Potential Security Impact: Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
HP has identified a potential security vulnerability with the Sure Start
implementation on certain 2015 commercial platforms. This vulnerability could
be exploited locally by administrator or root level privileges and if
compromised, the Sure Start systems could fail to recover the BIOS.
References:
* CVE-2016-2243
* PSRT110027
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Commercial Notebook, Desktop, and Workstation versions See the tables in the
vulnerability resolution for the impacted products.
BACKGROUND
For a PGP signed version of this security bulletin please write to:
security-alert@...com
For a PGP signed version of this security bulletin please write to:
hp-security-alert@...com
CVSS 2.0 Base Metrics
================================================================================
Reference Base Vector Base Score
CVE-2016-2243 (AV:L/AC:L/Au:N/C:P/I:C/A:P) 6.1
================================================================================
Information on CVSS is documented in HP Customer Notice: HPSN2008002.
RESOLUTION
HP has made the following product updates available for the impacted products.
To acquire the firmware updates, go to http://www.hp.com
1. Select Support and then Download Drivers.
2. Enter your product name or number in the Find my product field.
3. Choose the product from the returned search.
4. Choose the operating system.
5. Under the Download Index, select BIOS, and download the BIOS version as
listed in the table below. Follow the installation instructions to install
the firmware update.
Series Product name BIOS Version Win Softpaq
ZBook HP ZBook 15 G3 & ZBook 17 G3 1.03 SP74756
ZBook HP ZBook 15u G3 1.03 SP74756
ZBook HP ZBook Studio G3 1.04 SP74757
1000 Series HP EliteBook Folio 1040 G3 1.01 SP74768
1000 Series HP EliteBook Folio 1012 x2 G2 1.1 SP74770
1000 Series HP EliteBook 840 G3 1.04 SP74748
1000 Series HP EliteBook 850 G3 1.04 SP74748
1000 Series HP EliteBook 820 G3 1.04 SP74748
700 series HP Elitebook 745 G3 1.08 SP74691
700 series HP Elitebook 755 G3 1.08 SP74691
700 series HP Elitebook 725 G3 1.08 SP74691
700 series HP mt42 Mobile Thin Client 1.05 SP74761
800 series HP EliteDesk 800 G2 TWR 2.09 SP74661
800 series HP EliteDesk 800 G2 DM 2.1 SP74666
800 series HP mp9 G2 Retail System 2.1 SP74666
800 series HP EliteDesk 800 SFF 2.09 SP74661
800 series HP EliteOne 800 G2 23-in T/NT 2.1 SP74680
700 series HP EliteDesk 705 G2 MT/SFF 2.09 SP74655
700 series HP EliteDesk 705 G2 DM 2.05 SP74677
700 series HP EliteOne 705 G2 23in AiO T/NT 2.07 SP74686
Product name BIOS Version Win Softpaq Linux Softpaq
HP Z240 Tower Workstation N51 01.11 SP74759 SP74760
HP Z240 SFF Workstation N51 01.11 SP74759 SP74760
HP Z238 Microtower Workstation N51 01.11 SP74759 SP74760
System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current secure
solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the
attention of users of the affected HP products the important security
information contained in this Bulletin. HP recommends that all users determine
the applicability of this information to their individual situations and take
appropriate action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP will not be
responsible for any damages resulting from user's use or disregard of the
information provided in this Bulletin. To the extent permitted by law, HP
disclaims all warranties, either express or implied, including the warranties
of merchantability and fitness for a particular purpose, title and
non-infringement."
REVISION HISTORY
Version:1 (rev.1) 10 February 2016 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send email to hpsecurityalert@...com
Report: To report a potential security vulnerability with any HP supported
product, send email to: hpsecurityalert@...com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email: http://support.hp.com/us/en/subscribe/
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
secBullArchive
Software Product Category: The Software Product Category is represented in the
title by the two characters following HPSB.
PI = HP Printing and Imaging
HF = HP Hardware and Firmware
ST = HP Storage Software
GN = HP General Software
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: hp-security-alert@...com It is strongly recommended
that security related information being communicated to HP be encrypted using
PGP, especially exploit information.
To get the securityalert PGP key, please send an email message as follows:
To: hpsecurityalert@...com
Subject: get key
Products: HP ZBook 15 G3 & ZBook 17 G3, HP ZBook 15u G3, HP ZBook Studio G3, HP
EliteBook Folio 1040 G3, HP EliteBook Folio 1012 x2 G2, HP EliteBook 840 G3, HP
EliteBook 850 G3, HP EliteBook 820 G3, H Elitebook 745 G3, HP Elitebook 755 G3,
HP Elitebook 725 G3, HP mt42 Mobile Thin Client, HP EliteDesk 8, HP Z240 Tower
Workstation N51, HP Z240 SFF Workstation N51, HP Z238 Microtower Workstation
N51
Copyright 2016 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or its
affiliates, subcontractors or suppliers will be liable for incidental,special
or consequential damages including downtime cost; lost profits;damages relating
to the procurement of substitute products or services; or damages for loss of
data, or software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard Company in the
United States and other countries. Other product and company names mentioned
herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQIcBAEBCAAGBQJW2LawAAoJEPRuzn0I+N3ZlBQP/iZAxEvLMV62tYPB9zLr//rW
1vK8FkjwQfEuVqL4L6t1kOg8nw9jV/BEh2pYLf94J2LBhFVLJLis7wQhgLZA5ZHa
L4Qu1w9QaLjRod74Un2dFXJCYe9Hdqwrk/cAGsTKOg95jaC/IMmULsxIVZoRXtdg
d0k0FP2KJjh5qMfDFJSinGn0rmLuVQAzftJ1di2C9/xZ1RLGDId/znZVIrUgzsc2
ngqCVkcxT+0IvngY3vo22mbCv4woZtgR2hIV/FbMOXGOKF0Rj1pWpW5RAYy2aIir
/9kT/6RA3+3HLGklROBBwsBarkoo/iUtGeXOLLMCFqn4fxmQLZv4/QqgGHhE8Dll
NYwWkJjN1eCc6JsTsV0fny05kS3XDAPY3O1pSohVqgeagn4Ajn1f2FzwgQxOXQZR
HPU/29jOs/UwWl5pBkhLX/DiCbIr+VxHCgRGXHKFeCFjFVW4vZcyLwF15H8jdeXq
+KNGC8gNdlGeJljBfqBPebws3Iiha8yq+4AvSFI3U6VWozOgRf0WFTqO7r9fiCe9
pYubR8komb7uAzX6jGYkfjIU4Y2ya+l2YKH1snr2TELXYVv6Hf68zYzwCtxdBvGV
N78pM4OcvAkurqIaW5skyjVVp2VWc5IZpN9wLmnzj8mj/75yRdbajYndH4x74gXi
Mz+Ss7PPSnhjGvCLKb1P
=Ftsm
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists