Sony’s OTHER DRM software uninstaller will be pulled



According to zdnet.com, Sony and SunnComm are pulling the OTHER DRM uninstaller from the web and it will be replaced with a safer version of the uninstaller. Researchers blogging at freedom-to-tinker.com had detailed serious vulnerabilities in the uninstaller for the DRM software made by SunnComm (called MediaMax). The companies say an effort will be made to contact the 223 users who had downloaded the uninstaller for the MediaMax software.


This is very good, the buyback/swap info today and now 1 of the uninstallers has been pulled from the web, attempts are being made to contact the downloaders. As of yet, I don’t know that the XCP uninstaller is available again. I suspect since the XCP uninstaller was the one recommended to remove the controversial XCP rootkit, there are a few more than 223 users who had downloaded THAT one.

Also, Freedom-to-tinker is working with Sony to review the NEW uninstaller for MediaMax before it’s made publicly available. (Maybe the XCP uninstaller too?)

Related Posts

Blog Traffic Exchange Related Posts
  • Big Ubuntu Linux news This is something that really looks interesting. Recently Linspire announced their intent to open source the CNR (Click N Run) concept for installing software, launching a wiki based web site that would allow supported linux distributions to install software (open source or commercial) with as easy a process as possible......
  • Diebold Voting machine vulnerabilities Freedom to tinker brings us this BIG problem. I guess what concerns me most about this, is the way I see it, voter fraud has pretty much gone on since there have been elections. Let's face it, there is always someone, acting officially or not that will jockey for the......
  • More on the Sony XCP DRM (Rootkit) Freedom-to-tinker.com has some good detailed analysis on Sony's (mis) use of GPL software in their XCP DRM (Digital Rights Management) software that's been at the center of somewhat of a firestorm the last couple months. DRMS was the source of the code that was allegedly misappropriated, but the puzzle was......
Blog Traffic Exchange Related Websites
  • Black Hat // Webcast 28 - HTTP Parameter Pollution Vulnerabilities in Web Applications HTTP Parameter Pollution Vulnerabilities in Web Applications // Marco Balduzzi http://links.covertchannel.blackhat.com/ctt?kn=4&m=36625440&r=ODMwMzU3MTg2MAS2&b=2&j=MTAxNjM3NzA1S0&mt=1&rt=0 ----------------------------------- OVERVIEW: While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded......
  • (IN)SECURE Magazine Issue 26 released (IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Issue 26 has just been released. Download it from: http://www.insecuremag.com The covered topics include: - PCI: Security's lowest common denominator - Analyzing Flash-based RIA components and discovering vulnerabilities - Logs: Can we finally......
  • Google's Gmail Hacked by China Again Google discovered Chinese hackers tried to steal the passwords of senior U.S. government officials as well as South Korean officials, Chinese activists and journalists this past Wednesday.  There are also reports thousand of other email accounts were also targeted. Google stated on their blog, “The hackers tried to use a......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site