[prev in list] [next in list] [prev in thread] [next in thread]
List: patchmanagement
Subject: Re: [EXTERNAL]RE: [patchmanagement] Intel Firmware Vulnerability
From: "Brown, Curtis" <cbrown () nbcoxsackie ! com>
Date: 2017-05-26 17:57:36
Message-ID: 1495821456492.49200 () nbcoxsackie ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
All Dells here too, and a lot of 7010s, created a batch script to disable a=
nd remove the service and used psexec to run it on the entire network, now =
updating all the BIOS as time allows, whether they need it or not...better =
to be safe than sorry in my eyes, of course were only talking about a hundr=
ed or so machines, not HUNDREDS, so not a huge deal, just an inconvenience.=
Dell should compensate us monetarily for the time this crap takes though..=
.
Curtis Brown
This message is intended only for the use of the intended recipient and may=
contain information that is CONFIDENTIAL. If you are not the intended reci=
pient, you are hereby notified that any use, dissemination, disclosure or c=
opying of this communication is strictly prohibited. If you have received t=
his communication in error, please destroy all copies of this message and i=
t's attachments and notify us immediately.
Please consider the environment before printing this email.
________________________________
From: John Bailey <rekkanoryo@rekkanoryo.org>
Sent: Friday, May 26, 2017 12:27 PM
To: Patch Management Mailing List
Subject: Re: [EXTERNAL]RE: [patchmanagement] Intel Firmware Vulnerability
Brian,
Yes, it is confusing. I have a fleet of Dell OptiPlex 7010 machines. The =
Intel detection tool says "unknown" when I run it on my fleet. However, I =
know it should be vulnerable. I installed the new Dell BIOS update that co=
ntains the new firmware, only to find that it failed to install the Intel M=
anagement Engine update. Come to find out, we purchased these machines wit=
hout the Intel AMT features, so there's no management engine to be updated.=
It's possible you could be in a similar situation.
John
On Fri, May 26, 2017 at 10:33 AM, Brian Illner <Brian.Illner@canal-ins.com<=
mailto:Brian.Illner@canal-ins.com>> wrote:
This whole process is confusing..
The Intel detection GUI says my system is NOT vulnerable, but all the homeb=
rew queries and scripts point to my system AS vulnerable AND Dell does have=
a new BIOS released for it too?
BRIAN ILLNER | Canal Insurance Company
864.250.9227<tel:(864)%20250-9227>
864.679.2537<tel:(864)%20679-2537> Fax
[cid:image001.jpg@01D2D60B.8CB8A0A0]
Visit canalinsurance.com<http://canalinsurance.com> for news and informatio=
n.
---
PatchManagement.org is hosted by Shavlik
The content on the email list is intended for assisting administrators. If=
you would like to use any of this content in a blog or media publication, =
please contact the owners of the list for approval.
To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.=
org
If you are unable to unsubscribe via this email address, please email
owner-patchmanagement@patchmanagement.org
[Attachment #5 (text/html)]
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none"><!--P{margin-top:0;margin-bottom:0;} \
--></style> </head>
<body dir="ltr" style="font-size:12pt;color:#000000;background-color:#FFFFFF;font-family:Calibri,Arial,Helvetica,sans-serif;">
<p>All Dells here too, and a lot of 7010s, created a batch script to disable and \
remove the service and used psexec to run it on the entire network, now updating all \
the BIOS as time allows, whether they need it or not...better to be safe than sorry \
in my eyes, of course were only talking about a hundred or so machines, not \
HUNDREDS, so not a huge deal, just an inconvenience. Dell should compensate us \
monetarily for the time this crap takes though...<br> </p>
<p><br>
</p>
<div id="Signature">
<div name="divtagdefaultwrapper" \
style="font-family:Calibri,Arial,Helvetica,sans-serif; font-size:; margin:0"> \
<p><strong>Curtis Brown</strong></p> <p> </p>
<p><font size="2" face="Consolas,monospace">This message is intended only for the use \
of the intended recipient and may contain information that is CONFIDENTIAL. If you \
are not the intended recipient, you are hereby notified that any use, dissemination, \
disclosure or copying of this communication is strictly prohibited. If you have \
received this communication in error, please destroy all copies of this message and \
it's attachments and notify us immediately.</font></p> <p><font size="2" \
face="Consolas,monospace"><br> </font></p>
<p><font size="2" face="Consolas,monospace">Please consider the environment before \
printing this email.</font><br> </p>
</div>
</div>
<div style="color: rgb(33, 33, 33);">
<hr tabindex="-1" style="display:inline-block; width:98%">
<div id="divRplyFwdMsg" dir="ltr"><font style="font-size:11pt" color="#000000" \
face="Calibri, sans-serif"><b>From:</b> John Bailey \
<rekkanoryo@rekkanoryo.org><br> <b>Sent:</b> Friday, May 26, 2017 12:27 PM<br>
<b>To:</b> Patch Management Mailing List<br>
<b>Subject:</b> Re: [EXTERNAL]RE: [patchmanagement] Intel Firmware \
Vulnerability</font> <div> </div>
</div>
<div>
<div dir="ltr">Brian,
<div><br>
</div>
<div>Yes, it is confusing. I have a fleet of Dell OptiPlex 7010 machines. \
The Intel detection tool says "unknown" when I run it on my fleet. \
However, I know it should be vulnerable. I installed the new Dell BIOS update \
that contains the new firmware, only to find that it failed to install the Intel \
Management Engine update. Come to find out, we purchased these machines without \
the Intel AMT features, so there's no management engine to be updated. It's \
possible you could be in a similar situation.</div> <div><br>
</div>
<div>John<br>
<div class="gmail_extra"><br>
<div class="gmail_quote">On Fri, May 26, 2017 at 10:33 AM, Brian Illner <span \
dir="ltr"> <<a href="mailto:Brian.Illner@canal-ins.com" \
target="_blank">Brian.Illner@canal-ins.com</a>></span> wrote:<br> <blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex; border-left:1px #ccc solid; \
padding-left:1ex"> <div lang="EN-US">
<div class="m_-3811509508439803363WordSection1">
<p class="MsoNormal"><span style="font-family:"Arial",sans-serif; \
color:navy">This whole process is confusing..<u></u><u></u></span></p> <p \
class="MsoNormal"><span style="font-family:"Arial",sans-serif; \
color:navy"><u></u> <u></u></span></p> <p class="MsoNormal"><span \
style="font-family:"Arial",sans-serif; color:navy">The Intel detection GUI \
says my system is NOT vulnerable, but all the homebrew queries and scripts point to \
my system AS vulnerable AND Dell does have a new BIOS released for it \
too?<u></u><u></u></span></p> <p class="MsoNormal"><span \
style="font-family:"Arial",sans-serif; \
color:navy"><u></u> <u></u></span></p> <div>
<p class="MsoNormal"><b><span style="font-size:9.0pt; \
font-family:"Arial",sans-serif; color:navy">BRIAN</span></b><span \
style="font-size:9.0pt; font-family:"Arial",sans-serif; \
color:navy"> <b>ILLNER |</b></span><span style="font-size:7.5pt; \
font-family:"Arial",sans-serif; color:navy"> </span><span \
style="font-size:9.0pt; font-family:"Arial",sans-serif; color:navy">Canal \
Insurance Company<br> <a href="tel:(864)%20250-9227" value="+18642509227" \
target="_blank">864.250.9227</a><br> <a href="tel:(864)%20679-2537" \
value="+18646792537" target="_blank">864.679.2537</a> \
Fax<u></u><u></u></span></p> <p class="MsoNormal"><span style="font-size:9.0pt; \
font-family:"Arial",sans-serif; color:navy"><br> </span><span \
style="font-size:9.0pt; font-family:"Arial",sans-serif; color:navy"><img \
id="m_-3811509508439803363_x0000_i1026" style="width:3.677in; height:.8229in" \
width="353" height="79" src="cid:image001.jpg@01D2D60B.8CB8A0A0"></span><span \
style="font-size:9.0pt; font-family:"Arial",sans-serif; \
color:navy"> <br> <br>
Visit <a href="http://canalinsurance.com" \
target="_blank">canalinsurance.com</a> for news and \
information.<u></u><u></u></span></p> </div>
<p class="MsoNormal"><br>
</p>
</div>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>
["image001.jpg" (image/jpeg)]
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic