www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-insecurity.fr.html ...


From: GNUN
Subject: www/proprietary proprietary-insecurity.fr.html ...
Date: Sun, 25 Jun 2017 02:00:03 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/06/25 02:00:03

Modified files:
        proprietary    : proprietary-insecurity.fr.html 
        proprietary/po : proprietary-insecurity.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.42&r2=1.43

Patches:
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-insecurity.fr.html      16 Jun 2017 19:29:31 -0000      1.48
+++ proprietary-insecurity.fr.html      25 Jun 2017 06:00:03 -0000      1.49
@@ -92,6 +92,12 @@
 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>une
 faille de sécurité très grave pendant 10 ans</a>.</p>
 
+  <p>Cette vulnérabilité permettait aux crackers d'accéder à l'interface 
web de
+la « technologie Intel de gestion active » (AMT) de l'ordinateur <a
+href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>avec
+un mot de passe vide et leur donnait des droits d'adminitrateur</a> pour
+accéder au clavier, à la souris et au moniteur, entre autres privilèges.</p>
+
        <p>Dans les processeurs récents d'Intel il est impossible de 
désactiver le
 <cite>Management Engine</cite>, ce qui n'améliore en rien la
 situation. Ainsi, même les utilisateurs qui se préoccupent activement de
@@ -575,7 +581,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2017/06/16 19:29:31 $
+$Date: 2017/06/25 06:00:03 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- po/proprietary-insecurity.fr-en.html        16 Jun 2017 19:29:31 -0000      
1.42
+++ po/proprietary-insecurity.fr-en.html        25 Jun 2017 06:00:03 -0000      
1.43
@@ -79,6 +79,13 @@
        <a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>major
 security
        vulnerability for 10 years</a>.</p>
 
+  <p>The vulnerability allowed a cracker to access the computer's Intel Active
+      Management Technology
+      (AMT) <a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>
+      web interface with an empty password and gave administrative
+      access</a> to access the computer's keyboard, mouse, monitor
+      among other privileges.</p>
+
        <p>It does not help that in newer Intel processors, it is impossible
        to turn off the Intel Management Engine. Thus, even users who are 
        proactive about their security can do nothing to protect themselves 
@@ -507,7 +514,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/06/16 19:29:31 $
+$Date: 2017/06/25 06:00:03 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]