Feeds

Security back-door leaves Intel mail servers open

Remote access is a double-edged sword

  • alert
  • submit to reddit

Internet Security Threat Report 2014

A security glitch in Intel's InBusiness Email Station has left servers open to attack, according to a US security analyst. The hole was part of the original design in 1997 to allow remote control of servers in the event of serious technical problems. Without submitting a password, an intruder can issue commands to delete files, restore machines to factory settings or take over a machine completely using the secret back entrance to the server, says Kit Knox from Security site, Rootshell. Knox found the problem while evaluating the product and discovered the commands within the machine's start up instructions. Intel talking head, Mikki Fuller told CNET: "This was a back door that existed in our product. We are publishing code that will close the back door for our customers." Knox believes computer security would be improved if security software went open source. In this way there is less likelihood of there being security issues that are not known about. Which some people might interpret as an exercise in passing the buck. A similar criticism was made of Intel's Pentium III processor which it was alleged could allow Web sites or government agencies for instance to track users' Web habits. The fix update should be on Intel's support Web site late this afternoon. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.