[32746] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Dell BIOS DoS

daemon@ATHENA.MIT.EDU (jon schatz)
Tue Dec 9 12:58:29 2003

Message-ID: <3FD57BD6.4080702@divisionbyzero.com>
Date: Mon, 08 Dec 2003 23:37:58 -0800
From: jon schatz <jon@divisionbyzero.com>
MIME-Version: 1.0
To: James Evans <jae7@lehigh.edu>
Cc: bugtraq@securityfocus.com
In-Reply-To: <3FD4D931.7010407@lehigh.edu>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

James Evans wrote:
> This is not an incredibly serious problem as such, since a user can go 
> back into the BIOS setup and change the password there, provided the 
> BIOS Setup is not protected with an unknown password. Or, as a last 
> resort, Dell can be phoned to provide a master backdoor password, as 
> long as the user can prove herself the legal owner of the computer. Of 
> course, the prerequisite of physical access to the machine highly 
> mitigates this vulnerability.

...and once upon a time the default backdoor dell password was "dell".

seriously, bios passwords are worthless. there are numerous ways to get 
around them. most motherboards have a jumper that you can set to reset 
your cmos / bios (probably misusing one of those terms) to the factory 
defaults. or you can just yank the cmos battery out. for your laptop, it 
might be a bit trickier, but you can usually get to the jumpers 
underneath the keyboard (at least on my old sager you could).

hth.

-jon
-- 
jon@divisionbyzero.com || www.divisionbyzero.com
gpg key: www.divisionbyzero.com/pubkey.asc
think i have a virus? www.divisionbyzero.com/pgp.html
"You are in a twisty little maze of Sendmail rules, all confusing."



home help back first fref pref prev next nref lref last post