[iwar] [fc:Security.bug.hits.1m.Sony.Vaios]

From: Fred Cohen (fc@all.net)
Date: 2002-01-25 06:56:28


Return-Path: <sentto-279987-4379-1011970550-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 25 Jan 2002 06:57:09 -0800 (PST)
Received: (qmail 8394 invoked by uid 510); 25 Jan 2002 14:55:43 -0000
Received: from n29.groups.yahoo.com (216.115.96.79) by all.net with SMTP; 25 Jan 2002 14:55:43 -0000
X-eGroups-Return: sentto-279987-4379-1011970550-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.165] by n29.groups.yahoo.com with NNFMP; 25 Jan 2002 14:55:50 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 25 Jan 2002 14:55:49 -0000
Received: (qmail 87657 invoked from network); 25 Jan 2002 14:55:49 -0000
Received: from unknown (216.115.97.167) by m11.grp.snv.yahoo.com with QMQP; 25 Jan 2002 14:55:49 -0000
Received: from unknown (HELO red.all.net) (12.232.72.98) by mta1.grp.snv.yahoo.com with SMTP; 25 Jan 2002 14:55:49 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0PEuSU31815 for iwar@onelist.com; Fri, 25 Jan 2002 06:56:28 -0800
Message-Id: <200201251456.g0PEuSU31815@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 25 Jan 2002 06:56:28 -0800 (PST)
Subject: [iwar] [fc:Security.bug.hits.1m.Sony.Vaios]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

Security bug hits 1m Sony Vaios

By John Leyden

Posted: 25/01/2002 at 11:04 GMT

A hacker's backdoor affects an estimated million Vaio notebook computers,
manufacturer Sony warns.

The security flaw could let crackers manipulate or delete data on hard disks
and is found in proprietary software installed on Vaios sold in Asia, the
Middle East and South Africa since May 2001.

Vaio models bought in Europe or America are believed to be immune to the
problem, which relates to Manual CyberSupport for Vaio Version 3.0 and
Version 3.1 that is pre-installed in some models of Vaio computers and the
Recovery CD. 

In a statement , Sony said because of the vulnerability "there is a danger
that a third party may find a way to by pass the software's security and
access the Vaio through a homepage on the Internet or by email without
authorization." 

Either an "Internet homepage, email containing HTML or a HTML file attached
to an Email" containing malicious code might be used to exploit the glitch.

"If the Vaio is attacked in this way, it may result in stored data being
over written, erased or copied. In this instance, running regular anti-virus
software will not protect the affected models of Vaio", Sony warns.

Sony has provided a software patch on its site and is notifying Japanese
customers, where the majority of affected laptops were purchased, by email.
A call centre to field calls on the problem and offer affected customers the
software fix on a CD, has also been set up.

Sony estimates the software bug will cost it up to $1.49 million to fix. ®

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
Do you need to encrypt all your online transactions? Find
the perfect solution in this FREE Guide from VeriSign.
http://us.click.yahoo.com/vCuuSA/UdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST