[prev in list] [next in list] [prev in thread] [next in thread] 

List:       patchmanagement
Subject:    Re: [EXTERNAL]RE: [patchmanagement] Intel Firmware Vulnerability
From:       "Brown, Curtis" <cbrown () nbcoxsackie ! com>
Date:       2017-05-26 17:57:36
Message-ID: 1495821456492.49200 () nbcoxsackie ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


All Dells here too, and a lot of 7010s, created a batch script to disable a=
nd remove the service and used psexec to run it on the entire network, now =
updating all the BIOS as time allows, whether they need it or not...better =
to be safe than sorry in my eyes, of course were only talking about a hundr=
ed or so machines, not HUNDREDS, so not a huge deal, just an inconvenience.=
 Dell should compensate us monetarily for the time this crap takes though..=
.


Curtis Brown



This message is intended only for the use of the intended recipient and may=
 contain information that is CONFIDENTIAL. If you are not the intended reci=
pient, you are hereby notified that any use, dissemination, disclosure or c=
opying of this communication is strictly prohibited. If you have received t=
his communication in error, please destroy all copies of this message and i=
t's attachments and notify us immediately.


Please consider the environment before printing this email.

________________________________
From: John Bailey <rekkanoryo@rekkanoryo.org>
Sent: Friday, May 26, 2017 12:27 PM
To: Patch Management Mailing List
Subject: Re: [EXTERNAL]RE: [patchmanagement] Intel Firmware Vulnerability

Brian,

Yes, it is confusing.  I have a fleet of Dell OptiPlex 7010 machines.  The =
Intel detection tool says "unknown" when I run it on my fleet.  However, I =
know it should be vulnerable.  I installed the new Dell BIOS update that co=
ntains the new firmware, only to find that it failed to install the Intel M=
anagement Engine update.  Come to find out, we purchased these machines wit=
hout the Intel AMT features, so there's no management engine to be updated.=
  It's possible you could be in a similar situation.

John

On Fri, May 26, 2017 at 10:33 AM, Brian Illner <Brian.Illner@canal-ins.com<=
mailto:Brian.Illner@canal-ins.com>> wrote:
This whole process is confusing..

The Intel detection GUI says my system is NOT vulnerable, but all the homeb=
rew queries and scripts point to my system AS vulnerable AND Dell does have=
 a new BIOS released for it too?

BRIAN ILLNER | Canal Insurance Company
864.250.9227<tel:(864)%20250-9227>
864.679.2537<tel:(864)%20679-2537> Fax

[cid:image001.jpg@01D2D60B.8CB8A0A0]

Visit canalinsurance.com<http://canalinsurance.com> for news and informatio=
n.


---
PatchManagement.org is hosted by Shavlik

The content on the email list is intended for assisting administrators.  If=
 you would like to use any of this content in a blog or media publication, =
please contact the owners of the list for approval.

To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.=
org
If you are unable to unsubscribe via this email address, please email
owner-patchmanagement@patchmanagement.org
[Attachment #5 (text/html)]

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none"><!--P{margin-top:0;margin-bottom:0;} \
--></style> </head>
<body dir="ltr" style="font-size:12pt;color:#000000;background-color:#FFFFFF;font-family:Calibri,Arial,Helvetica,sans-serif;">
 <p>All Dells here too, and a lot of 7010s, created a batch script to disable and \
remove the service and used psexec to run it on the entire network, now updating all \
the BIOS as time allows, whether they need it or not...better to be safe than sorry \
in my eyes,  of course were only talking about a hundred or so machines, not \
HUNDREDS, so not a huge deal, just an inconvenience. Dell should compensate us \
monetarily for the time this crap takes though...<br> </p>
<p><br>
</p>
<div id="Signature">
<div name="divtagdefaultwrapper" \
style="font-family:Calibri,Arial,Helvetica,sans-serif; font-size:; margin:0"> \
<p><strong>Curtis Brown</strong></p> <p>&nbsp;</p>
<p><font size="2" face="Consolas,monospace">This message is intended only for the use \
of the intended recipient and may contain information that is CONFIDENTIAL. If you \
are not the intended recipient, you are hereby notified that any use, dissemination, \
disclosure  or copying of this communication is strictly prohibited. If you have \
received this communication in error, please destroy all copies of this message and \
it's attachments and notify us immediately.</font></p> <p><font size="2" \
face="Consolas,monospace"><br> </font></p>
<p><font size="2" face="Consolas,monospace">Please consider the environment before \
printing this email.</font><br> </p>
</div>
</div>
<div style="color: rgb(33, 33, 33);">
<hr tabindex="-1" style="display:inline-block; width:98%">
<div id="divRplyFwdMsg" dir="ltr"><font style="font-size:11pt" color="#000000" \
face="Calibri, sans-serif"><b>From:</b> John Bailey \
&lt;rekkanoryo@rekkanoryo.org&gt;<br> <b>Sent:</b> Friday, May 26, 2017 12:27 PM<br>
<b>To:</b> Patch Management Mailing List<br>
<b>Subject:</b> Re: [EXTERNAL]RE: [patchmanagement] Intel Firmware \
Vulnerability</font> <div>&nbsp;</div>
</div>
<div>
<div dir="ltr">Brian,
<div><br>
</div>
<div>Yes, it is confusing.&nbsp; I have a fleet of Dell OptiPlex 7010 machines.&nbsp; \
The Intel detection tool says &quot;unknown&quot; when I run it on my fleet.&nbsp; \
However, I know it should be vulnerable.&nbsp; I installed the new Dell BIOS update \
that contains the new firmware, only  to find that it failed to install the Intel \
Management Engine update.&nbsp; Come to find out, we purchased these machines without \
the Intel AMT features, so there's no management engine to be updated.&nbsp; It's \
possible you could be in a similar situation.</div> <div><br>
</div>
<div>John<br>
<div class="gmail_extra"><br>
<div class="gmail_quote">On Fri, May 26, 2017 at 10:33 AM, Brian Illner <span \
dir="ltr"> &lt;<a href="mailto:Brian.Illner@canal-ins.com" \
target="_blank">Brian.Illner@canal-ins.com</a>&gt;</span> wrote:<br> <blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex; border-left:1px #ccc solid; \
padding-left:1ex"> <div lang="EN-US">
<div class="m_-3811509508439803363WordSection1">
<p class="MsoNormal"><span style="font-family:&quot;Arial&quot;,sans-serif; \
color:navy">This whole process is confusing..<u></u><u></u></span></p> <p \
class="MsoNormal"><span style="font-family:&quot;Arial&quot;,sans-serif; \
color:navy"><u></u>&nbsp;<u></u></span></p> <p class="MsoNormal"><span \
style="font-family:&quot;Arial&quot;,sans-serif; color:navy">The Intel detection GUI \
says my system is NOT vulnerable, but all the homebrew queries and scripts point to \
my system AS vulnerable AND Dell does have a new BIOS released for it \
too?<u></u><u></u></span></p> <p class="MsoNormal"><span \
style="font-family:&quot;Arial&quot;,sans-serif; \
color:navy"><u></u>&nbsp;<u></u></span></p> <div>
<p class="MsoNormal"><b><span style="font-size:9.0pt; \
font-family:&quot;Arial&quot;,sans-serif; color:navy">BRIAN</span></b><span \
style="font-size:9.0pt; font-family:&quot;Arial&quot;,sans-serif; \
color:navy">&nbsp;<b>ILLNER&nbsp;|</b></span><span style="font-size:7.5pt; \
font-family:&quot;Arial&quot;,sans-serif; color:navy"> </span><span \
style="font-size:9.0pt; font-family:&quot;Arial&quot;,sans-serif; color:navy">Canal \
Insurance Company<br> <a href="tel:(864)%20250-9227" value="&#43;18642509227" \
target="_blank">864.250.9227</a><br> <a href="tel:(864)%20679-2537" \
value="&#43;18646792537" target="_blank">864.679.2537</a> \
Fax<u></u><u></u></span></p> <p class="MsoNormal"><span style="font-size:9.0pt; \
font-family:&quot;Arial&quot;,sans-serif; color:navy"><br> </span><span \
style="font-size:9.0pt; font-family:&quot;Arial&quot;,sans-serif; color:navy"><img \
id="m_-3811509508439803363_x0000_i1026" style="width:3.677in; height:.8229in" \
width="353" height="79" src="cid:image001.jpg@01D2D60B.8CB8A0A0"></span><span \
style="font-size:9.0pt; font-family:&quot;Arial&quot;,sans-serif; \
color:navy">&nbsp;<br> <br>
Visit <a href="http://canalinsurance.com" \
target="_blank">canalinsurance.com</a>&nbsp;for news and \
information.<u></u><u></u></span></p> </div>
<p class="MsoNormal"><br>
</p>
</div>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>


["image001.jpg" (image/jpeg)]

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic