a BIOS BUG discovered..?!
-
BillMorrow
- *Senior* Admin

- Posts: 7153
- Joined: Tue Apr 13, 2004 9:40 pm
- Location: San Francisco -> Florida -> Georgia
- Contact:
a BIOS BUG discovered..?!
follow the link..
http://hothardware.com/news/lenovo-rock ... nerability
http://hothardware.com/news/lenovo-rock ... nerability
Bill Morrow, kept by parrots
& cockatoos
Sysop - forum.thinkpads.com
*
She was not what you would call refined,
She was not what you would call unrefined,
She was the type of person who kept a parrot.
~~~Mark Twain~~~
Sysop - forum.thinkpads.com
*
She was not what you would call refined,
She was not what you would call unrefined,
She was the type of person who kept a parrot.
~~~Mark Twain~~~
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: a BIOS BUG discovered..?!
It is this issue https://support.lenovo.com/us/us/solutions/LEN-8324
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
-
ajkula66
- SuperUserGeorge

- Posts: 15731
- Joined: Sun Feb 25, 2007 11:28 am
- Location: Brodheadsville, Pennsylvania
Re: a BIOS BUG discovered..?!
Heh...I guess that Kržanić now has an excuse to lay off more Intel employees, after those 12K sacked recently...not that heads shouldn't roll at Lenovo.
Will they? I highly doubt it.
Will they? I highly doubt it.
...Knowledge is a deadly friend when no one sets the rules...(King Crimson)
Cheers,
George (your grouchy retired FlexView farmer)
AARP club members:A31p, T43pSF
Abused daily: R61
PMs requesting personal tech support will be ignored.
Cheers,
George (your grouchy retired FlexView farmer)
AARP club members:A31p, T43pSF
Abused daily: R61
PMs requesting personal tech support will be ignored.
-
evening_hunger
- Sophomore Member
- Posts: 189
- Joined: Thu Nov 26, 2015 2:55 pm
- Location: Rouen, France
Re: a BIOS BUG discovered..?!
Who is Kržanić?
x220/i7-2620M/8GB/256gb.ssd/ips/debian (main driver)
x230/i5/8GB/500gb.hdd+256gb.m2ssd/tn/debian+win7 (better half)
x230/i5/8GB/500gb.hdd+256gb.m2ssd/tn/debian+win7 (better half)
-
RealBlackStuff
- Admin
- Posts: 17485
- Joined: Mon Sep 18, 2006 5:17 am
- Location: Mt. Cobb, PA USA
- Contact:
Re: a BIOS BUG discovered..?!
Kržanić is the CEO of Intel.
Lovely day for a Guinness! (The Real Black Stuff)
Check out The Boardroom for Parts, Mods and Other Services.
Check out The Boardroom for Parts, Mods and Other Services.
Re: a BIOS BUG discovered..?!
Not surprising given the cavalier attitude towards adding feature bloat to the BIOS. The BIOS is way, way too complex these days.
T23, T42, T60, X201, and X250 all running OpenBSD
Re: a BIOS BUG discovered..?!
That's because it's UEFI now, not BIOS. True BIOS is still simple... or basic, more accurately.Kilkenny wrote:The BIOS is way, way too complex these days.
ThinkStation P700 · C20 | ThinkPad P40 · 600
Re: a BIOS BUG discovered..?!
A complete UEFI source tree is several hundred megs in size, and when you build it, it produces >1GB of intermediate stuff, before everything is somehow packed into a single 16MB binary. It's pretty mind boggling how it all works (and that it even works). 
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: a BIOS BUG discovered..?!
There is nothing wrong about that, especially if at least half of the source tree size are automatic testsdr_st wrote:A complete UEFI source tree is several hundred megs in size, and when you build it, it produces >1GB of intermediate stuff, before everything is somehow packed into a single 16MB binary. It's pretty mind boggling how it all works (and that it even works).
These bugs are different issue. Pushing for low-cost software developers and saving on them pays back.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
Re: a BIOS BUG discovered..?!
As if bugs are only introduced by "low-cost software developers"...Puppy wrote:These bugs are different issue. Pushing for low-cost software developers and saving on them pays back.
Current: X220 4291-4BG, T410 2537-R46, T60 1952-F76, T60 2007-QPG, T42 2373-F7G
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
Collectibles: T430s (IPS FHD + Classic Keyboard), X32 (IPS Screen)
Retired: X61 7673-V2V, A31p w/ Ultrabay Numpad
Past: Z61t 9440-A23, T60 2623-D3U, X32 2884-M5U
Re: a BIOS BUG discovered..?!
Speaking of UEFI complexity, the author of the exploit admits himself that one is more likely to be hit by lightening than affected by this issue.
http://blog.cr4.sh/2016/06/exploring-an ... enovo.html
Not mentioned in the public media is the fact that someone would have to have physical access to a machine to run the exploit, the system not have a boot password and USB would have to be enabled as a boot device. Anyone who keeps their system(s) secure with either a boot password or a BIOS password and USB excluded as a boot device have zero probability of being affected by this. And, it's not like there are a bunch of people running around with this exploit on USB keys in the first place.
http://blog.cr4.sh/2016/06/exploring-an ... enovo.html
Not mentioned in the public media is the fact that someone would have to have physical access to a machine to run the exploit, the system not have a boot password and USB would have to be enabled as a boot device. Anyone who keeps their system(s) secure with either a boot password or a BIOS password and USB excluded as a boot device have zero probability of being affected by this. And, it's not like there are a bunch of people running around with this exploit on USB keys in the first place.
ThinkStation P700 · C20 | ThinkPad P40 · 600
-
jaspen-meyer
- Senior Member

- Posts: 630
- Joined: Wed May 19, 2010 11:21 pm
- Location: Pardubice, Czech Republic
- Contact:
Re: a BIOS BUG discovered..?!
That's a quote appearing in the article bill linked to - noteworthy no source is named.Importantly, because Lenovo did not develop the vulnerable SMM code and is still in the process of determining the identity of the original author, it does not know its originally intended purpose. But, as part of the ongoing investigation, Lenovo is engaging all of its IBVs as well as Intel to identify or rule out any additional instances of the vulnerability's presence in the BIOS provided to Lenovo by other IBVs, as well as the original purpose of the vulnerable code.
Eric, I wonder about the need for a usb drive. My understanding is the 'Intel Management Engine' is designed to facilitate remote intrusion. I recently read the spec speet for the bios chip in an R30, circa 2003, and was surprised to learn it could be programed with 125kHz radio waves. Surely technology has improved since 2003.
T420 Ivy Bridge i7 3612QM, x24 xiphmont led, x60s libreboot, led, T400 libreboot, (in progress testing Q9100)
Re: a BIOS BUG discovered..?!
It's standard practice not to name sources when they don't come forth to the vendor first. It's a way to mitigate those seeking fame rather than doing this to truly help the industry.
It's certainly possible to write an executable that writes this exploit to memory, reboots a system and attempts to run the code at the EFI level just like a flash update. However, I'm not confident at this time that anything could be done with the data dump since there wouldn't be a place to retain it while a system boots. This would be needed to retrieve it later and potentially send over a network. That's where booting via USB becomes an important key in the process.
I'd also want to know if disabling the "Flash UEFI by end user" option would prevent this exploit from running. I've not inspected the exploit in detail to see what calls it makes.
IME/AMT might be usable in lieu of USB depending on the system. I'm not sure at this time if this exploit could run over AMT. Plus, AMT would have to be enabled. Many organizations disable it based on standard security practices.
The impact of this seems immeasurably low. The PR impact will certainly be higher than anything.
Lenovo released an affected systems list and is keeping it updated as research is completed on each system.
It's certainly possible to write an executable that writes this exploit to memory, reboots a system and attempts to run the code at the EFI level just like a flash update. However, I'm not confident at this time that anything could be done with the data dump since there wouldn't be a place to retain it while a system boots. This would be needed to retrieve it later and potentially send over a network. That's where booting via USB becomes an important key in the process.
I'd also want to know if disabling the "Flash UEFI by end user" option would prevent this exploit from running. I've not inspected the exploit in detail to see what calls it makes.
IME/AMT might be usable in lieu of USB depending on the system. I'm not sure at this time if this exploit could run over AMT. Plus, AMT would have to be enabled. Many organizations disable it based on standard security practices.
The impact of this seems immeasurably low. The PR impact will certainly be higher than anything.
Lenovo released an affected systems list and is keeping it updated as research is completed on each system.
ThinkStation P700 · C20 | ThinkPad P40 · 600
-
Puppy
- Senior ThinkPadder

- Posts: 2256
- Joined: Sat Oct 30, 2004 4:52 am
- Location: Prague, Czech Republic
Re: a BIOS BUG discovered..?!
One positive comment, Lenovo has tested even old .20 series models and very likely release BIOS updates for them. This is good support after allerik wrote:Lenovo released an affected systems list and is keeping it updated as research is completed on each system.
ThinkPad (1992 - 2012): R51, X31, X220, Tablet 8
-
- Similar Topics
- Replies
- Views
- Last post
-
-
Chrome bug that lets sites secretly record you
by Puppy » Thu Jun 01, 2017 5:53 am » in Off-Topic Stuff - 2 Replies
- 181 Views
-
Last post by Saucey
Fri Jun 02, 2017 12:30 am
-
-
-
How can I tell if my T60 running BIOS 2.27 already has the Zender SLIC2.1 no-whitelist BIOS?
by Muse » Fri Apr 21, 2017 2:42 pm » in ThinkPad T6x Series - 4 Replies
- 767 Views
-
Last post by axur-delmeria
Sun Apr 23, 2017 11:47 am
-
-
-
safe to flash T500 7VET94WW bios with whitelist bios for 6FET92WW
by TPFanatic » Wed Apr 26, 2017 7:35 pm » in ThinkPad T400/410/420 and T500/510/520 Series - 4 Replies
- 722 Views
-
Last post by TPFanatic
Thu Apr 27, 2017 6:28 pm
-
-
-
Hardware Maintenance Diskette for UEFI BIOS - Replacing S/N on UEFI Machines
by TPCollector » Fri Jan 13, 2017 9:13 pm » in Thinkpad - General HARDWARE/SOFTWARE questions - 10 Replies
- 2358 Views
-
Last post by TPCollector
Sat Jan 14, 2017 7:49 pm
-
Who is online
Users browsing this forum: No registered users and 3 guests




