[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-insecurity.fr.html ...
From: |
GNUN |
Subject: |
www/proprietary proprietary-insecurity.fr.html ... |
Date: |
Sun, 25 Jun 2017 02:00:03 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/06/25 02:00:03
Modified files:
proprietary : proprietary-insecurity.fr.html
proprietary/po : proprietary-insecurity.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.42&r2=1.43
Patches:
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-insecurity.fr.html 16 Jun 2017 19:29:31 -0000 1.48
+++ proprietary-insecurity.fr.html 25 Jun 2017 06:00:03 -0000 1.49
@@ -92,6 +92,12 @@
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">une
faille de sécurité très grave pendant 10 ans</a>.</p>
+ <p>Cette vulnérabilité permettait aux crackers d'accéder à l'interface
web de
+la « technologie Intel de gestion active » (AMT) de l'ordinateur <a
+href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">avec
+un mot de passe vide et leur donnait des droits d'adminitrateur</a> pour
+accéder au clavier, à la souris et au moniteur, entre autres privilèges.</p>
+
<p>Dans les processeurs récents d'Intel il est impossible de
désactiver le
<cite>Management Engine</cite>, ce qui n'améliore en rien la
situation. Ainsi, même les utilisateurs qui se préoccupent activement de
@@ -575,7 +581,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/06/16 19:29:31 $
+$Date: 2017/06/25 06:00:03 $
<!-- timestamp end -->
</p>
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- po/proprietary-insecurity.fr-en.html 16 Jun 2017 19:29:31 -0000
1.42
+++ po/proprietary-insecurity.fr-en.html 25 Jun 2017 06:00:03 -0000
1.43
@@ -79,6 +79,13 @@
<a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
vulnerability for 10 years</a>.</p>
+ <p>The vulnerability allowed a cracker to access the computer's Intel Active
+ Management Technology
+ (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
+ web interface with an empty password and gave administrative
+ access</a> to access the computer's keyboard, mouse, monitor
+ among other privileges.</p>
+
<p>It does not help that in newer Intel processors, it is impossible
to turn off the Intel Management Engine. Thus, even users who are
proactive about their security can do nothing to protect themselves
@@ -507,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/06/16 19:29:31 $
+$Date: 2017/06/25 06:00:03 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary-insecurity.fr.html ...,
GNUN <=