HP Support Alerts - 07.04.2015 - HP Thin Clients running Windows Embedded Standard 7 (WES7) or Windows Embedded Standard 2009 (WES09) with HP Easy Deploy, Remote Elevation of Privilege, Execution of Code

TBCS IT announces the following HP Support Alert: 

 

Find more here

If you need any assistance please call us: +49 (0)5321 35 1000 or send an e-mail to sales@tbcs-it.de

 

Release Date: 2015-04-07

Last Updated: 2015-04-07


Potential Security Impact: Remote elevation of privilege, execution of code

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY

Potential security vulnerabilities have been identified with certain HP Thin Clients running Windows Embedded Standard 7 (WES7) and Windows Embedded Standard 2009 (WES09) and all versions of HP Easy Deploy. The vulnerabilities could be exploited remotely to allow elevation of privilege and execution of code.

Note: HP Easy Deploy was bundled in versions of HP Easy Tools prior to version 3.0.1.1650.

References:
  • CVE-2015-2112
  • CVE-2015-2113
  • SSRT101680

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

Note: All versions of Easy Deploy running on Windows Embedded Standard 7 (WES7) Easy Deploy are vulnerable.

Following is a complete list of affected hardware platforms.

Hardware Platforms Affected:
  • HP t5540 Thin Client
  • HP t5740 Thin Client
  • HP t5740e Thin Client
  • HP t510 Flexible Thin Client
  • HP t610 Flexible Thin Client
  • HP t810 Flexible Thin Client

BACKGROUND

For a PGP signed version of this security bulletin please write to: security-alert@hp.com

The Hewlett-Packard Company thanks Junior Meijering for reporting this issue security-alert@hp.com.

RESOLUTION

HP has removed HP Easy Deploy from the HP Easy Tools software package beginning with version 3.0.1.1650.

HP recommends updating HP Easy Tools thin client management software to at least version 3.0.1.1650 or later.

Alternatively, customers may choose to remove older versions of HP Easy Tools containing HP Easy Deploy while logged in as an Administrator by using either of the following methods:
  • Method 1: Remove HP Easy Tools from Add/Remove Program
  • Method 2: Execute the command Msiexec.exe /x{EB60CBE5-19E8-4A62-AB13-1CF5FA4F9C82}

HISTORY
Version:1 (rev.1) - 7 April 2015 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

©Copyright 2015 Hewlett-Packard Development Company, L.P.

 
 

Passende Artikel

 
 

Kommentar schreiben

 

Die mit einem * markierten Felder sind Pflichtfelder.