TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

INTEL-SA-00075 – AMT Linux Detection and Mitigation Tools

47 pointsby laamalifabout 8 years ago

4 comments

ramshornsabout 8 years ago
Looks like it does roughly the same thing as this [1]. I guess it&#x27;s a tossup between a proprietary program from Intel or a free program on github from the person who found the bug.<p>[1] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14335159" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=14335159</a>
评论 #14363463 未加载
评论 #14362791 未加载
评论 #14362165 未加载
i336_about 8 years ago
Something security-related to keep in mind (TL;DR at end):<p>Directory state after initial unpack (becomes important in a minute):<p><pre><code> -rwxr-xr-x 1 i336 users 19K May 13 10:43 INTEL-SA-00075-Discovery-Tool -rw-r--r-- 1 i336 users 27K May 13 10:57 INTEL-SA-00075-Discovery-Tool.c -rwxr-xr-x 1 i336 users 15K May 13 10:44 INTEL-SA-00075-Unprovisioning-Tool -rw-r--r-- 1 i336 users 16K May 13 10:42 INTEL-SA-00075-Unprovisioning-Tool.c -rw-r--r-- 1 i336 users 187 May 13 10:42 Makefile </code></pre> Build:<p><pre><code> $ cd INTEL-SA-00075-Discovery-Unprovisioning-Tool-Engineering-Release $ make gcc -I..&#x2F;..&#x2F;usr&#x2F;include INTEL-SA-00075-Discovery-Tool.c -o INTEL-SA-00075-Discovery-Tool strip INTEL-SA-00075-Discovery-Tool INTEL-SA-00075-Unprovisioning-Tool $ </code></pre> OK; wipe and do it again:<p><pre><code> $ rm INTEL-SA-00075-Discovery-Tool INTEL-SA-00075-Unprovisioning-Tool $ make gcc -I..&#x2F;..&#x2F;usr&#x2F;include INTEL-SA-00075-Discovery-Tool.c -o INTEL-SA-00075-Discovery-Tool gcc -I..&#x2F;..&#x2F;usr&#x2F;include INTEL-SA-00075-Unprovisioning-Tool.c -o INTEL-SA-00075-Unprovisioning-Tool strip INTEL-SA-00075-Discovery-Tool INTEL-SA-00075-Unprovisioning-Tool $ </code></pre> Wait - why did the unprovisioning tool only get compiled on the second build?<p>Because the binary for the unprovisioning tool is <i>two minutes NEWER</i> than the source code, as shown in the directory listing.<p>The binary for the discovery tool is older than the source (as normal).<p>Objectively it&#x27;s 50&#x2F;50 as to whether this is meaningless noise or something hidden. Of course everything points toward the former, but I thought I&#x27;d leave this here just in case.<p>It&#x27;s worth noting that an independent security company rapidly found (and announced) the vulnerability after the initial undisclosed CVE. So if it was that easy, this vulnerability has clearly been known about in various circles for a while.<p>It&#x27;s also worth noting that the build process strips the binary, which is arguably unnecessary, but is a nice way to explain why there are no debug symbols in the provided binaries.<p>Again, I trust Intel and can easily talk this away as the inanites of bureaucracy and management and deadlines, but my &quot;hmmm&quot; sense is tingling nonetheless.
评论 #14367238 未加载
orblivionabout 8 years ago
Thankfully it comes from an https connection on downloadmirror.intel.com. But there&#x27;s no md5 sha1sum or sha256sum posted anywhere else. For whatever it&#x27;s worth this is what I got:<p>INTEL-SA-00075-Linux-Detection-and-Mitigation-Tools-v1.1.zip<p>md5: a4645f80a0d573a8345545954d8da8ed<p>sha1: 600ca16f9530dd9069b42e9696b0ea772eb059f0<p>sha256: 808620dd939bd3011c689eb8f4f56d92195159fd5cab570dd86598c68dd7ec63
peraabout 8 years ago
This is weird: this tool says my laptop is vulnerable, although AMT is disabled. I also tried mjg59&#x27;s mei-amt-check and it indicated that because my system is unprovisioned it was not vulnerable.
评论 #14364605 未加载
评论 #14363766 未加载