twitter google-plus facebook instagram pinterest Rechercher triangle-down Femme Actuelle Beauté-Addict Hellocoton Mon compte
Vous êtes sur la partie communautaire de Beauté Addict : Le Blog de Danaefiona

publié aujourd'hui à 5h45 Beauté › Maquillage

Dell was thrust into the spotlight yesterday when researchers first broke word of eDellRoot, a rogue certificate authority quietly installed on Windows machines that can be exploited by man-in-the-middle attackers to decrypt people's encrypted web traffic.The Texas PC-slinger said the issue was merely a mishap related to its user support tools. Dell bristled at suggestions the flaw should be considered malware or adware, but nonetheless it has provided users with a removal tool.The American biz has also pushed a software update that will automatically remove the vulnerable root CA cert from its machines. Dell has published a guide on how to remove the web security backdoor it installed in its Windows laptops and desktop PCs.This confirms what we all know by now – that Dell was selling computers with a rather embarrassing hole it in their defenses.New models from the XPS, Precision and Inspiron families include a powerful root CA certificate called eDellRoot, which puts the machines' owners at risk of identity theft and banking fraud.The self-signed certificate is bundled with its private key, which is a boon for man-in-the-middle attackers: for example, if an affected Dell connects to a malicious Wi-Fi hotspot, whoever runs that hotspot can use Dell's cert and key to silently decrypt the victims' web traffic. This would reveal their usernames, passwords, session cookies and other sensitive details, when shopping or banking online, or connecting to any other HTTPS-protected website.Stunningly, the certificate cannot be simply removed: a .DLL plugin included with the root certificate reinstalls the file if it is deleted. One has to delete the .DLL – Dell.Foundation.Agent.Plugins.eDell.dll – as well as the eDellRoot certificate.

Dell has posted information [.docx] on how to do this properly, and future machines will not include the dangerous root CA cert. A software update process will run from November 24 that will remove the certificate automatically from machines, we're told.The recent situation raised is related to an on-the-box support certificate intended to provide a better, faster and easier customer support experience. Unfortunately, the certificate introduced an unintended security vulnerability. Dell said that it started including the root CA certificate with machines in August, although an Inspiron 15 series laptop we bought in July has an eDellRoot certificate on it.We deeply regret that this has happened and are taking steps to address it, added Laura Thomas, Dell's chief blogger.The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing us to quickly identify the computer model, making it easier and faster to service our customers. This certificate is not being used to collect personal customer information.

  • Battery for ASUS UX31
  • Battery for ASUS G75
  • Battery for ASUS G73S
  • Battery for ASUS C22-UX31
  • Battery for ASUS A32-K55
  • Battery for Apple PowerBook G4 15inch
  • Battery for Apple MacBook Pro 17inch
  • Battery for Apple MacBook Pro 15

It’s also important to note that the certificate will not reinstall itself once it is properly removed using the recommended Dell process.If you've got a new Dell, you can check here to see if you the dodgy root CA cert installed. For everyone, we'll leave you with this nightmare fuel... Updated The rogue root certificate in new Dell computers – a certificate that allows people to be spied on when banking and shopping online – will magically reinstall itself even when deleted.El Reg can confirm that the eDellRoot root CA cert, discovered over the weekend, automatically reappears when removed from the Windows operating system. We tried this on a Windows 8 Inspiron 15 series laptop that was bought in July this year for our San Francisco office.You can find the dangerous certificate by opening up the Start menu, select Run, type in certmgr.msc into the box and hit Enter. Then open up the Trusted Root Certification Authority folder on the left, then Certificates, and in the window should appear eDellRoot. That's the SOB you're looking for. Right-click over it, hit Remove, click through the warning box. And it's gone.

Then reboot, reopen certmgr.msc – the Windows certificate manager – and search for the certificate eDellRoot. Bingo, it's back. Visiting one of the websites that test whether you have a vulnerable certificate installed reveals that, yes, the removed root CA cert was put back during or after the reboot.Lenovo had a similar party trick with its bloatware earlier this year, using Microsoft's Windows Platform Binary Table. How Dell reinstates the missing certificate is not clear at this stage. But the cat came back the very next day, er, reboot ... the Dell eDellRoot cert that just won't die (click to enlarge) This means that the recommended procedure to get rid of the vulnerable root CA file on Windows will not work, as the component reappears upon restart. The certificate, issued by Dell in April and expires in 2039, contains a private key that can be extracted and used to pull off man-in-the-middle attacks on Dell owners – like Lenovo's Superfish cluster-fsck.For example, usernames, passwords, session cookies and other sensitive information can be silently siphoned from affected Dell machines when they connect to the web through malicious Wi-Fi hotspots in cafes, hospitals, airports, and so on.People with recent XPS, Precision and Inspiron models should use Mozilla's Firefox to browse the web as this software has its own set of trusted certification authorities, and ignores the dangerous eDellRoot cert.

Dell's support line tells people the certificate doesn't cause any threat to the system. On Twitter, the IT giant said: Customer security and privacy is a top concern for Dell. We are investigating the issue and will have further updates soon.According to an analysis [PDF] by Duo Security, a bundled plugin reinstalls the root CA file if it is removed. First, you must delete Dell.Foundation.Agent.Plugins.eDell.dll from your system (search for it) and then remove the eDellRoot root CA certificate.The cert, we're told, is used with the plugin for receiving cryptographically signed telemetry requests; said telemetry includes things like the machine's service tag, a seven-character serial number that identifies the computer model, if not the individual machine.This highlights a disturbing trend among original equipment manufacturer (OEM) hardware vendors. Tampering with certificate stores exposes users to unnecessary, increased risk, the Duo team – Darren Kemp, Mikhail Davidov, and Kyle Lady – wrote in their report.Tampering with the certificate store is a questionable practice, and OEM’s need to be careful when adding new trusted certificates, especially root certificates. Sadly, OEM manufacturers seem to not be learning from historical mistakes and keep making them over and over.

  • Battery for Apple MacBook Pro 15.4
  • Battery for Apple MacBook Pro 13inch
  • Battery for Apple A1495
  • Battery for Apple A1278
  • Battery for Acer Aspire AS5745
  • Battery for Acer Aspire 7741G
  • Battery for Acer Aspire 7551G
  • Battery for Acer Aspire 5741G
  • Battery for Acer Aspire 5740G
  • Battery for Acer Aspire 4736

Dell ships computers with all the tools necessary for crooks to spy on the owners' online banking, shopping, webmail, and more.The US IT titan installs a powerful root CA certificate, including its private key, on its Windows notebooks and desktops. These can be abused by eavesdropping miscreants to silently decrypt encrypted web browser traffic without victims noticing.If you try to remove the dodgy certificate, the file is automatically reinstalled during or after the next boot up. The self-signed root CA cert appears to have been created in early April this year, and expires in the year 2039.How can this certificate be abused? Well, an attacker could, for example, set up a malicious Wi-Fi hotspot in a cafe or hospital, intercept connections from Dell machines, and then automatically strip away the encryption – a classic man-in-the-middle attack, all enabled by Dell's security blunder.The decrypted traffic will include usernames, passwords, session cookies, and other sensitive information. The root CA certificate – eDellRoot – can even be used to sign programs, allowing scumbags to dress up malware as legit apps.Web browsers, and other software, running on the affected Dell hardware will trust any certificates issued by eDellRoot. When the browser tries to connect to, say, your bank's HTTPS-protected website, it could in fact be connecting to a malicious system on your network, such as the aforementioned evil wireless hotspot. This system can pretend to be your bank's website, using an eDellRoot-signed SSL certificate, and you would be none the wiser as you type in your username and password. The intercepting system can even log into the bank on your behalf and pass the webpages back to your browser so you're none the wiser of what's going on.

Dell customers reported over the weekend finding the root CA certificate on newer Dell XPS, Precision and Inspiron desktops and notebooks.So far, we've seen reports on Twitter and Reddit of the following affected gear: the XPS 15, Latitude E7450, Inspirion 5548, Inspirion 5000, Inspiron 3647, and the Precision M4800.Information security expert Kenn White has created a webpage that demonstrates how vulnerable Dell computers will happily accept HTTPS connections signed with the eDellRoot key.Crucially, White also said Firefox is not affected by the rogue certificate because it uses its own set of trusted certs.Another site to test whether your Dell is vulnerable to man-in-the-middle attacks can be found here.Dell computer owner Joe Nord, who blogged details of the certificate installed in his Inspirion machine, noted the obvious security flaw with eDellRoot.Root certificates are always self-signed, so all I really know is that eDellRoot says eDellRoot is legit, he explained. Where it breaks down is that the private key IS PRESENT on my computer and that means ... bad.Dell has yet to respond to a request for comment on the matter, although the Dell Cares support account on Twitter is downplaying the risk of attack for users:The issue is just like Lenovo's February Superfish scandal in which the PC-slinger was caught loading its machines with a tool capable of intercepting SSL traffic and injecting adverts into pages. In fact, the Dell certificate was created months after the Superfish blowup – was no one at the Texas goliath paying attention?

0 vote 0 commentaire

Partagez cet article

Réagissez à l'article de Danaefiona

Si vous avez un compte Addict, connectez-vous :


Mot de passe

Sinon, utilisez simplement le formulaire ci-dessous pour déposer votre commentaire :

Votre pseudo *

URL de votre site ou blog

Votre commentaire *

Afficher les commentaires

Batterie pour ASUS K72JE

Étant donné que le service n’est pas encore disponible au grand public, malheureusement je n’ai pas été en mesure de confirmer ce qui se passe une fois que vous appuyez sur le bouton « Run Speed Test ». Cependant, Engadget a réussi à accéder à la fonctionnalité, mettant en évidence...

Akku für Dell Precision M4500

Vor 20 Jahren gelang Forschern in England die erste Kernfusion. Das Ende aller Energiesorgen sei in Sicht, jubelten sie damals. Wie die Kernfusion theoretisch funktioniert und warum sie praktisch nicht funktioniert. Wie läuft die Kernfusion ab? In der Theorie ganz einfach: Schwere und überschwere...

Akku für Apple PowerBook G4 12inch

Im Juni vergangenen Jahres entdeckte die Polizei am Flughafen von San Diego eine qualmende Tasche auf dem Gepäckförderband. Darin war eine Lithium-Ionen-Batterie gegen einen Schraubenzieher gekommen und beide schmolzen. Im September 2012 erlitten eine Flugbegleiterin und zwei Passagiere...

Akku für Acer Aspire 3820TG

Der am Dienstag erlassene Bann gegen elektronische Geräte auf bestimmten Direktflügen in die USA fußt offenbar auf neuen Erkenntnissen über die Fähigkeiten der Terrorgruppe al-Qaida. Angeblich gebe es Geheimdienst-Hinweise, dass Al-Qaida-Terroristen auf neuartige Weise explosive Stoffe in...

Battery for Toshiba PA3635U-1BRM

The report contains incidents contributed by organisations including the CERT Insider Threat Center; CrowdStrike, Deloitte; the Dutch National High Tech Crime Unit, Kaspersky Lab and the US Secret Service, amongst others. The study also includes the US Health and Human Services incident database...

Batterie pour HP COMPAQ 6530s

Évidemment, s’il s’agit d’une idée intéressante, elle va certainement être assez coûteuse. De plus, et surtout dans les premiers mois de sa naissance, il faudrait mieux exposer votre bébé à l’homme avant de lui introduire un tas de gadgets. Allez, mettons de côté ce brevet !Apple...

Akku für ASUS G53JW

Geschichten über brennende oder explodierende Akkus stammen meist aus der Zeit der Nickel-Cadmium-Batterien. Bei Lithium-Ionen-Akkus, die sich in heutigen Smartphones und Laptops befinden, ist das praktisch ausgeschlossen, sagt Matthias Baumann vom Tüv Rheinland. Die Schutzmechanismen innerhalb...

Batterie pour HP HSTNN-CB1Q

OneNote synchronise vos données avec votre compte Microsoft, et utilise OneDrive pour stocker tout ce que vous enregistrez. Vous disposerez de 5 Go, qui peuvent être pauvres si vous stockez un grand nombre d’images et d’autres médias.Comme la plupart des applications de prise de notes...

Akku für HP Compaq 8710p

Bei Android gibt es die größte Geräteauswahl. Dafür kann es sein, dass sich die Bedienung je nach Hersteller unterscheidet - wenn aber überhaupt, dann nur leicht. Am besten überlegt man sich vorher genau, was das Gerät können sollte und liest dann Tests. Denn die Spannweite ist groß: Es...

Beauté AddictBlogs B.A.Tous les Blogs