Sony’s OTHER DRM software uninstaller will be pulled



According to zdnet.com, Sony and SunnComm are pulling the OTHER DRM uninstaller from the web and it will be replaced with a safer version of the uninstaller. Researchers blogging at freedom-to-tinker.com had detailed serious vulnerabilities in the uninstaller for the DRM software made by SunnComm (called MediaMax). The companies say an effort will be made to contact the 223 users who had downloaded the uninstaller for the MediaMax software.


This is very good, the buyback/swap info today and now 1 of the uninstallers has been pulled from the web, attempts are being made to contact the downloaders. As of yet, I don’t know that the XCP uninstaller is available again. I suspect since the XCP uninstaller was the one recommended to remove the controversial XCP rootkit, there are a few more than 223 users who had downloaded THAT one.

Also, Freedom-to-tinker is working with Sony to review the NEW uninstaller for MediaMax before it’s made publicly available. (Maybe the XCP uninstaller too?)

Related Posts

Blog Traffic Exchange Related Posts
  • Sony DRM Rootkit -- it's worse I did this as updates to an earlier post, but it probably deserves it's own post now. The morning brought us the news of SERIOUS flaws in the Uninstaller ActiveX control for Sony's DRM, then came news of ANOTHER flaw, this one a privilige escalation "attacker can take control of......
  • Big Ubuntu Linux news This is something that really looks interesting. Recently Linspire announced their intent to open source the CNR (Click N Run) concept for installing software, launching a wiki based web site that would allow supported linux distributions to install software (open source or commercial) with as easy a process as possible......
  • How to Remove ActiveSecurity | Active Security Removal Guide ActiveSecurity is a rogue antivirus application that uses graphics to indicate a similarity with Microsoft Security Center. It installs via malware including trojans and brings several files along with it when it installs that it then claims are viral and that in order to clean up the mess the user......
Blog Traffic Exchange Related Websites
  • How Software Can Help Determine Coin Collection Value Everywhere you turn things are going high tech. Cars have navigation systems in them which will tell you where to turn. Phones can tell you where the nearest hot spot is. Your computer can tell you what your coin collection value is. This last one is something which even many......
  • Google's Gmail Hacked by China Again Google discovered Chinese hackers tried to steal the passwords of senior U.S. government officials as well as South Korean officials, Chinese activists and journalists this past Wednesday.  There are also reports thousand of other email accounts were also targeted. Google stated on their blog, “The hackers tried to use a......
  • Black Hat // Webcast 28 - HTTP Parameter Pollution Vulnerabilities in Web Applications HTTP Parameter Pollution Vulnerabilities in Web Applications // Marco Balduzzi http://links.covertchannel.blackhat.com/ctt?kn=4&m=36625440&r=ODMwMzU3MTg2MAS2&b=2&j=MTAxNjM3NzA1S0&mt=1&rt=0 ----------------------------------- OVERVIEW: While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site