Jump to content

New Emergency Updater in CCleaner v5.36


lmacri

Recommended Posts

The change log for CCleaner v5.36.6278 (released 24-Oct-2017) at http://www.piriform.com/ccleaner/version-history includes the following:

 

Emergency Updater
        - Added new executable: "CCUpdate.exe"
        - Added new Windows Scheduled Task: "CCleaner Update"

 

I assume this Emergency Updater was added to allow Piriform to force an automatic product update if another critical security vulnerability is detected in CCleaner (e.g., similar to the Floxif trojan that was embedded in CCleaner v5.33.6162 as announced <here>).

Before I update to v5.36, could someone please tell me if this Emergency Updater is now included in both the Free and Professional versions of CCleaner, and whether the CCupdate.exe will now be loaded into memory at boot-up even though I've disabled my setting to start CCleaner at boot-up and turned off both System Monitoring and Active Monitoring at Options | Monitoring?

-----------
32-bit Vista Home Premium SP2 * Firefox ESR v52.4.0 * NS Premium v22.11.0.41 * MB Premium v3.2.2 * CCleaner Free 5.35.6210

Link to comment
Share on other sites

No need to "assume" anything, they lay everything out here. https://forum.piriform.com/index.php?showtopic=49067 ....

 

Hi Special:

 

Thanks for the link to that update announcement.  I haven't installed the v5.36 update yet but it sounds like the new Emergency Updater is included in both the Free and Professional versions of CCleaner.

-----------

32-bit Vista Home Premium SP2 * Firefox ESR v52.4.0 * NS Premium v22.11.0.41 * MB Premium v3.2.2 * CCleaner Free 5.35.6210

Link to comment
Share on other sites

What is the purpose of giving us the option to disable automatic updates at installation.... if you nevertheless inserted CCleaner exes into the Windows Task Scheduler itself to permanently run !

We are not complaining that you did so - but that you did not give us the *option* - just the option - to UNCHECK this at installation time and opt out of it.

 

We have to come here, start threads, and only then be told that you did this and how you did it and how to disable it.

An option, just an option at installation would keep *everyone* happy because they would have a *choice*.

 

 

No matter what the intent, people use computers differently. We have computer illiterate cousins and friends on whose computers we disable ALL updates because the moment something out of the ordinary happens like Firewalls intercepting CCleaner trying to phone home (!)  guess who gets the call at 3am and has to drive 40 minutes to turn that off. It doesn't matter what the reason is, inserting yourself to run with Windows with no warning or OPT OUT option, is the exact _opposite_ of what the purpose of CCleaner is. Please make a CHECKABLE option to opt in or out of this intrusive behavior.

Link to comment
Share on other sites

...We are not complaining that you did so - but that you did not give us the *option* - just the option - to UNCHECK this at installation time and opt out of it...

 

According to Martin Brinkmann's ghacks.net article CCleaner 5.36 Emergency Updater this new feature is likely based on the Avast Antivirus Emergency Updater introduced in 2012.

 

I agree with c627627 that Piriform should add an option to the CCleaner settings to give users a simple way to permanently disable this new Emergency Updater.  CCleaner is a disk cleaner - not a real-time antivirus protecting my system from malware attacks - and users like myself who have already disabled the option to Automatically Check for Updates to CCleaner might not want CCUpdate.exe launching at boot-up and connecting to a remote server every day to check for "emergency" updates.

 

It's critical that Avast/Piriform explain to customers how they will improve their acceptance testing and release management to ensure the "security incident in September" (as it's referred to in the v5.36 announcement <here>) doesn't happen again.  Knowing that CCleaner has an Emergency Updater that can perform a forced update if a digitally-signed and white-listed installer ever plants another backdoor Trojan on my computer doesn't do much to restore my confidence in the product.

 

The old saying "closing the barn door after the horse has already bolted" comes to mind. :)

-----------

32-bit Vista Home Premium SP2 * Firefox ESR v52.4.0 * NS Premium v22.11.0.41 * MB Premium v3.2.2 * CCleaner Free 5.35.6210

Link to comment
Share on other sites

  • 9 months later...
  • 3 months later...
On 10/26/2017 at 20:01, lmacri said:

...According to Martin Brinkmann's ghacks.net article CCleaner 5.36 Emergency Updater this new feature is likely based on the Avast Antivirus Emergency Updater introduced in 2012.

I agree with c627627 that Piriform should add an option to the CCleaner settings to give users a simple way to permanently disable this new Emergency Updater.  CCleaner is a disk cleaner - not a real-time antivirus protecting my system from malware attacks - and users like myself who have already disabled the option to Automatically Check for Updates to CCleaner might not want CCUpdate.exe launching at boot-up and connecting to a remote server every day to check for "emergency" updates...

According to the AskVG article [Tip] Customize and Control CCleaner Automatic Updates Settings, the Emergency Updater introduced in v5.36 can be disabled in v5.50 (released 29-Nov-2018) by disabling Options | Updates | Important Updates (highly recommended).  Could someone please confirm this is correct, and that disabling this setting actually disables the Windows scheduled task CCleaner Update?
-----------
32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security v22.15.1.8 * CCleaner Portable v5.47.6716

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.