+ Selenium Server 2.39.0 released
http://docs.seleniumhq.org/download/
+ Selenium Internet Explorer Driver Server 2.39.0 released
http://docs.seleniumhq.org/download/
+ Selenium WebDriver 2.39.0 released
http://docs.seleniumhq.org/download/
+ VMware ESX and ESXi Virtual Machine File Descriptors Local Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/64491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5973
ウイルスバスタービジネスセキュリティサービス 緊急メンテナンスのお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2055
JewelryBoxのAndroid向けアプリアップデートのお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2054
サーバメンテナンスのお知らせ(2014年1月15日)
http://app.trendmicro.co.jp/support/news.asp?id=2052
[更新]ダメージクリーンナップエンジン 7.1 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2020
[更新]ウイルス検索エンジン VSAPI 9.750 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2006
JVNDB-2013-000126 HP Autonomy Ultraseek におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000126.html
ネットエージェント、Baidu IMEが入力内容を無断送信との調査結果を公表
クラウド入力機能を無効にしていても、各種の情報をサーバーへ送信
http://itpro.nikkeibp.co.jp/article/NEWS/20131227/527505/?ST=security
中国百度がIME入力情報送信問題で見解を発表、「Simejiはバグでログ誤送信」
http://itpro.nikkeibp.co.jp/article/NEWS/20131226/527369/?ST=security
「Baidu IME」「Simeji」が入力文字や識別IDをサーバーに送信、ネットエージェントが調査
http://itpro.nikkeibp.co.jp/article/NEWS/20131226/527351/?ST=security
Snowden容疑者、英TV局のメッセージビデオで「大規模監視活動に終止符を」
http://itpro.nikkeibp.co.jp/article/NEWS/20131226/527222/?ST=security
UPDATE: JVN#53768697 Android OS において任意の Java のメソッドが実行される脆弱性
http://jvn.jp/jp/JVN53768697/index.html
2013年12月27日金曜日
2013年12月26日木曜日
26日 木曜日、仏滅
JVNDB-2013-000125 サイボウズ ガルーンのケータイ機能における認証回避の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000125.html
JVNDB-2013-000124 サイボウズ ガルーンにおける SQL インジェクションの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000124.html
サイバー攻撃対策の民間組織が発足
会員企業で情報や知見を共有する
http://itpro.nikkeibp.co.jp/article/COLUMN/20131220/526245/?ST=security
ムダだらけのセキュリティ投資を防ぐ4つのポイント
http://itpro.nikkeibp.co.jp/article/COLUMN/20131223/526602/?ST=security
サイバー攻撃を受けたら2時間以内に緊急対応、NECやNRIセキュアなどが提供開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131225/527066/?ST=security
富士通エフサスがXP延命サービスを強化、適用ツールを1種から6種に拡大
http://itpro.nikkeibp.co.jp/article/NEWS/20131225/527054/?ST=security
Samsungの「Galaxy S4」に重大な脆弱性、イスラエルの大学が発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131225/526986/?ST=security
Snowden容疑者、米紙のインタビューに応え「任務は完了した」
http://itpro.nikkeibp.co.jp/article/NEWS/20131225/526962/?ST=security
標的型攻撃が悪質化し現金被害も急増、欠かせないユーザーの当事者意識
http://itpro.nikkeibp.co.jp/article/COLUMN/20131222/526462/?ST=security
2013年12月25日水曜日
25日 水曜日、先負
+ REMOTE: Red Hat CloudForms Management Engine 5.1 - agent/linuxpkgs Path Traversal
http://www.exploit-db.com/exploits/30469
+ REMOTE: Zimbra Collaboration Server - LFI
http://www.exploit-db.com/exploits/30472
+ REMOTE: Firefox 5.0 - 15.0.1 - __exposedProps__ XCS Code Execution
http://www.exploit-db.com/exploits/30474
+ SA56224 Linux Kernel "get_wchan()" Stack Frame Unwinding Denial of Service Vulnerability
http://secunia.com/advisories/56224/
+ Linux Kernel 'unwind_frame()' Function Multiple Local Denial of Service Vulnerabilities
http://www.securityfocus.com/bid/64510
ServerProtect for Linux 3.0 の Kernel Hook Module (RHEL6.x/CentOS6.x)作成に関するお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2051
JVNDB-2013-000120 IrfanView におけるバッファオーバーフローの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000120.html
JVNDB-2013-000123 VMware ESX および ESXi において任意のファイルにアクセス可能な問題
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000123.html
2013年の国内セキュリティソフト市場は2024億円の予測、IDC Japan
http://itpro.nikkeibp.co.jp/article/NEWS/20131225/526922/?ST=security
クオリティソフト、インベントリー管理ソフト新版はVDI向けにリソース使用率を可視化
http://itpro.nikkeibp.co.jp/article/NEWS/20131224/526742/?ST=security
REMOTE: Synology DiskStation Manager - SLICEUPLOAD Remote Command Execution
http://www.exploit-db.com/exploits/30470
REMOTE: OpenSIS 'modname' - PHP Code Execution
http://www.exploit-db.com/exploits/30471
REMOTE: HP SiteScope issueSiebelCmd - Remote Code Execution
http://www.exploit-db.com/exploits/30473
LOCAL: RealNetworks RealPlayer 16.0.3.51/16.0.2.32 - (.rmp) Version Attribute Buffer Overflow
http://www.exploit-db.com/exploits/30468
LOCAL: Huawei Technologies du Mobile Broadband 16.0 - Local Privilege Escalation
http://www.exploit-db.com/exploits/30477
2013年12月24日火曜日
24日 火曜日、友引
+ RHSA-2013:1868 Important: xorg-x11-server security update
http://rhn.redhat.com/errata/RHSA-2013-1868.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424
+ RHSA-2013:1869 Important: pixman security update
http://rhn.redhat.com/errata/RHSA-2013-1869.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425
+ RHSA-2013:1866 Moderate: ca-certificates security update
http://rhn.redhat.com/errata/RHSA-2013-1866.html
+ CESA-2013:1869 Important CentOS 6 pixman Update
http://lwn.net/Alerts/577856/
+ CESA-2013:1866 Moderate CentOS 6 ca-certificates Update
http://lwn.net/Alerts/577853/
+ CESA-2013:1861 Moderate CentOS 5 nss Update
http://lwn.net/Alerts/577855/
+ CESA-2013:1869 Important CentOS 5 pixman Update
http://lwn.net/Alerts/577857/
+ CESA-2013:1868 Important CentOS 6 xorg-x11-server Update
http://lwn.net/Alerts/577858/
+ CESA-2013:1868 Important CentOS 5 xorg-x11-server Update
http://lwn.net/Alerts/577859/
+ CESA-2013:1861 Moderate CentOS 6 nss Update
http://lwn.net/Alerts/577854/
+ phpMyAdmin 4.1.2 is released
http://sourceforge.net/p/phpmyadmin/news/2013/12/phpmyadmin-412-is-released/
+ Linux kernel 3.12.6, 3.10.25, 3.4.75 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.6
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.25
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.75
+ VMSA-2013-0016 VMware ESXi and ESX unauthorized file access through vCenter Server and ESX
http://www.vmware.com/security/advisories/VMSA-2013-0016.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5973
+ HS13-026 XXE (Xml eXternal Entity) Vulnerability in Cosminexus
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-026/index.html
+ HS13-026 CosminexusにおけるXXE(Xml eXternal Entity)の脆弱性
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS13-026/index.html
+ Dovecot 2.2.10 released
http://www.dovecot.org/list/dovecot-news/2013-December/000268.html
+ VMware ESX Server Lets Local Users View and Modify Files
http://www.securitytracker.com/id/1029529
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5973
+ Firefox 5.0 - 15.0.1 __exposedProps__ XCS Code Execution
http://cxsecurity.com/issue/WLB-2013120154
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710
+ SA56116 libpng "png_read_transform_info()" NULL Pointer Dereference Denial of Service Vulnerability
http://secunia.com/advisories/56116/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954
+ VMware ESX and ESXi Virtual Machine File Descriptors Local Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/64491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5973
忘れられる権利
http://itpro.nikkeibp.co.jp/article/COLUMN/20131210/523609/?ST=security
退職社員のHDDを複製して情報漏えいの痕跡を保全するサービスが登場
http://itpro.nikkeibp.co.jp/article/NEWS/20131220/526290/?ST=security
狙われる製造業――ファイア・アイが最近のサイバー攻撃動向を解説
http://itpro.nikkeibp.co.jp/article/NEWS/20131220/526288/?ST=security
日本を標的にした攻撃が増加、シマンテックが2013年のセキュリティ脅威を総括
http://itpro.nikkeibp.co.jp/article/NEWS/20131220/526222/?ST=security
旧モデルMacBookなどで盗撮が可能---米大学の研究レポート
http://itpro.nikkeibp.co.jp/article/NEWS/20131220/526242/?ST=security
Googleが透明性レポートを更新、政府による削除要請が急増
http://itpro.nikkeibp.co.jp/article/NEWS/20131220/526184/?ST=security
XPサポート終了を機に「高コスト低セキュリティ」状態の棚卸を
マカフィー
マーケティング本部プロダクトマーケティング部
スペシャリスト 松久育紀氏
セールスエンジニアリング本部フィールドSE部
シニアセールスシステムズエンジニア 二宮秀一郎氏
http://itpro.nikkeibp.co.jp/article/Interview/20131216/524927/?ST=security
JVNVU#90537868 Apple Motion における任意のコード実行の脆弱性に対するアップデート
http://jvn.jp/cert/JVNVU90537868/
DoS/PoC: Easy Karaokay Player 3.3.31 (.wav) Integer Division by Zero
http://www.exploit-db.com/exploits/30422
DoS/PoC: PotPlayer Version 1.5.40688 .avi File Handling Memory Corruption Vulnerability
http://www.exploit-db.com/exploits/30413
DoS/PoC: GOM Player 2.2.56.5158 - .avi File Handling Memory Corruption Vulnerability
http://www.exploit-db.com/exploits/30414
2013年12月20日金曜日
20日 金曜日、仏滅
+ RHSA-2013:1861 Moderate: nss security update
http://rhn.redhat.com/errata/RHSA-2013-1861.html
+ About the security content of Motion 5.1
http://support.apple.com/kb/HT6041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6114
+ Wireshark 1.10.5 released
http://www.wireshark.org/docs/relnotes/wireshark-1.10.5.html
+ HPSBGN02950 rev.1 - HP Autonomy Ultraseek, Cross-Site Scripting (XSS)
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04041082-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6196
+ Apple Motion Memory Access Error Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1029521
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6114
+ cURL Certificate Validation Flaw Lets Remote Users Spoof SSL Servers
http://www.securitytracker.com/id/1029517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422
+ Wireshark SIP/BSSGP/NTLMSSP Dissector Bugs Let Remote Users Deny Service
http://www.securitytracker.com/id/1029516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
Endpoint Security MI Server R73 certificate validation
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97784&src=securityAlerts
ウイルスバスター モバイル バージョン3.5.0.1135リリースのお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2050
Zimbra Newsletter - December 2013
http://telligent.com/company/news/b/newsletters/archive/2013/12/19/zimbra-newsletter-december-2013.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1386302884723.1387497640194.20&__hssc=122069652.1.1387497640194&__hsfp=908252101
世界のセキュリティ・ラボから日経コミュニケーション
2014年に向けて標的型メール攻撃の対策を
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525163/?ST=security
実録版、東京都バス無料Wi-Fiを早速使ってみた
http://itpro.nikkeibp.co.jp/article/Watcher/20131218/525743/?ST=security
人間に代わって自動ログイン、NTTコムがパスワード入力代行ソフトを発売
http://itpro.nikkeibp.co.jp/article/NEWS/20131219/525982/?ST=security
サイファー・テック、社員だけが閲覧できる暗号化PDFサービスを開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131219/525943/?ST=security
「経営層から技術の先端まで一気通貫」、トーマツがサイバーセキュリティ研究所を設立
http://itpro.nikkeibp.co.jp/article/NEWS/20131219/525928/?ST=security
http://rhn.redhat.com/errata/RHSA-2013-1861.html
+ About the security content of Motion 5.1
http://support.apple.com/kb/HT6041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6114
+ Wireshark 1.10.5 released
http://www.wireshark.org/docs/relnotes/wireshark-1.10.5.html
+ HPSBGN02950 rev.1 - HP Autonomy Ultraseek, Cross-Site Scripting (XSS)
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04041082-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6196
+ Apple Motion Memory Access Error Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1029521
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6114
+ cURL Certificate Validation Flaw Lets Remote Users Spoof SSL Servers
http://www.securitytracker.com/id/1029517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422
+ Wireshark SIP/BSSGP/NTLMSSP Dissector Bugs Let Remote Users Deny Service
http://www.securitytracker.com/id/1029516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
Endpoint Security MI Server R73 certificate validation
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97784&src=securityAlerts
ウイルスバスター モバイル バージョン3.5.0.1135リリースのお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2050
Zimbra Newsletter - December 2013
http://telligent.com/company/news/b/newsletters/archive/2013/12/19/zimbra-newsletter-december-2013.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1386302884723.1387497640194.20&__hssc=122069652.1.1387497640194&__hsfp=908252101
世界のセキュリティ・ラボから日経コミュニケーション
2014年に向けて標的型メール攻撃の対策を
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525163/?ST=security
実録版、東京都バス無料Wi-Fiを早速使ってみた
http://itpro.nikkeibp.co.jp/article/Watcher/20131218/525743/?ST=security
人間に代わって自動ログイン、NTTコムがパスワード入力代行ソフトを発売
http://itpro.nikkeibp.co.jp/article/NEWS/20131219/525982/?ST=security
サイファー・テック、社員だけが閲覧できる暗号化PDFサービスを開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131219/525943/?ST=security
「経営層から技術の先端まで一気通貫」、トーマツがサイバーセキュリティ研究所を設立
http://itpro.nikkeibp.co.jp/article/NEWS/20131219/525928/?ST=security
2013年12月19日木曜日
19日 木曜日、先負
+ CESA-2013:1850 Important CentOS 6 openjpeg Update
http://lwn.net/Alerts/577511/
+ UPDATE: HPSBHF02953 rev.2 - HP B-series SAN Network Advisor, Remote Code Execution
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04045640-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
+ GnuPG 1.4.16 released
http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000337.html
+ GnuPG 1.4.16 fixes RSA key extraction via acoustic side channel
http://cxsecurity.com/issue/WLB-2013120135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
+ SA56138 Zimbra Collaboration Server Unspecified Vulnerability
http://secunia.com/advisories/56138/
+ SA56097 Wireshark Multiple Denial of Service Vulnerabilities
http://secunia.com/advisories/56097/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
+ Linux Kernel 'perf_trace_event_perm()' Function Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/64318
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930
InterScan for Microsoft Exchange 11.0 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2048
チェックしておきたい脆弱性情報<2013.12.19>
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525005/?ST=security
日本の中枢狙う標的型攻撃が発覚、ゼロデイ脆弱性を使う周到な手口
http://itpro.nikkeibp.co.jp/article/COLUMN/20131126/520792/?ST=security
インストールできない!WindowsやOfficeの非正規品がオンラインショップで急増中
http://itpro.nikkeibp.co.jp/article/NEWS/20131218/525771/?ST=security
マトリクス認証「SECUREMATRIX」がHTML画面に変更、Flash/Java/ActiveXを不要に
http://itpro.nikkeibp.co.jp/article/NEWS/20131218/525651/?ST=security
米技術企業の最高幹部ら、オバマケアサイトやNSAの問題などで米大統領と会談
http://itpro.nikkeibp.co.jp/article/NEWS/20131218/525582/?ST=security
JVNVU#98366726 Apple Safari における複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNVU98366726/index.html
http://lwn.net/Alerts/577511/
+ UPDATE: HPSBHF02953 rev.2 - HP B-series SAN Network Advisor, Remote Code Execution
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04045640-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
+ GnuPG 1.4.16 released
http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000337.html
+ GnuPG 1.4.16 fixes RSA key extraction via acoustic side channel
http://cxsecurity.com/issue/WLB-2013120135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
+ SA56138 Zimbra Collaboration Server Unspecified Vulnerability
http://secunia.com/advisories/56138/
+ SA56097 Wireshark Multiple Denial of Service Vulnerabilities
http://secunia.com/advisories/56097/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
+ Linux Kernel 'perf_trace_event_perm()' Function Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/64318
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930
InterScan for Microsoft Exchange 11.0 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2048
チェックしておきたい脆弱性情報<2013.12.19>
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525005/?ST=security
日本の中枢狙う標的型攻撃が発覚、ゼロデイ脆弱性を使う周到な手口
http://itpro.nikkeibp.co.jp/article/COLUMN/20131126/520792/?ST=security
インストールできない!WindowsやOfficeの非正規品がオンラインショップで急増中
http://itpro.nikkeibp.co.jp/article/NEWS/20131218/525771/?ST=security
マトリクス認証「SECUREMATRIX」がHTML画面に変更、Flash/Java/ActiveXを不要に
http://itpro.nikkeibp.co.jp/article/NEWS/20131218/525651/?ST=security
米技術企業の最高幹部ら、オバマケアサイトやNSAの問題などで米大統領と会談
http://itpro.nikkeibp.co.jp/article/NEWS/20131218/525582/?ST=security
JVNVU#98366726 Apple Safari における複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNVU98366726/index.html
2013年12月18日水曜日
18日 水曜日、友引
+ RHSA-2013:1850 Important: openjpeg security update
http://rhn.redhat.com/errata/RHSA-2013-1850.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6052
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6054
+ Wireshark 1.10.4 released
http://www.wireshark.org/docs/relnotes/wireshark-1.10.4.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
+ HPSBHF02953 rev.1 - HP B-series SAN Network Advisor, Remote Code Execution
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04045640-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
+ UPDATE: HPSBPI02938 rev.2 - Certain HP LaserJet Printers, Remote Denial of Service (DoS)
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04041432-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ Multiple Buffer Errors vulnerability in LibTIFF
https://blogs.oracle.com/sunsecurity/entry/multiple_buffer_errors_vulnerability_in
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
+ CVE-2012-4564 Design Error vulnerability in LibTIFF
https://blogs.oracle.com/sunsecurity/entry/cve_2012_4564_design_error1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
+ Multiple Cryptographic Issues vulnerabilities in Ruby
https://blogs.oracle.com/sunsecurity/entry/multiple_cryptographic_issues_vulnerabilities_in
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363
+ CVE-2013-4475 Access Control vulnerability in Samba
https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
+ Multiple vulnerabilities in Wireshark
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark8
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340
+ curl and libcurl 7.34.0 released
http://curl.haxx.se/changes.html#7_34_0
+ Red Hat JBoss Portal Input Validation Flaw Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1029510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4424
+ Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
http://www.securitytracker.com/id/1029505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5228
+ REMOTE: Adobe Reader ToolButton Use After Free
http://www.exploit-db.com/exploits/30394
+ LOCAL: Microsoft Windows ndproxy.sys Local Privilege Escalation
http://www.exploit-db.com/exploits/30392
+ DoS/PoC: PHP openssl_x509_parse() Memory Corruption Vulnerability
http://www.exploit-db.com/exploits/30395
+ DoS/PoC: MS13-101 Windows Kernel win32k.sys - Integer Overflow
http://www.exploit-db.com/exploits/30397
+ Microsoft Windows ndproxy.sys Privilege Escalation Exploit
http://cxsecurity.com/issue/WLB-2013120125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
+ Microsoft Windows NDPROXY Local SYSTEM Privilege Escalation
http://cxsecurity.com/issue/WLB-2013120040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
+ Windows Kernel win32k.sys Integer Overflow (MS13-101)
http://cxsecurity.com/issue/WLB-2013120087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5058
+ SA56144 Apple OS X Multiple Vulnerabilities
http://secunia.com/advisories/56144/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5228
[更新]ウイルス検索エンジン VSAPI 9.750 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2006
Trend Micro Network VirusWall Enforcer 1500i/3500i/3600i バージョン 3.x Critical Patch (Build 1023) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2049
Trend Micro Network VirusWall Enforcer 2500 バージョン 2.0 Critical Patch (Build 1106) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2047
DBConvert / DBSync for PostgreSQL and Oracle released
http://www.postgresql.org/about/news/1496/
JVNDB-2013-000111 Android OS において任意の Java のメソッドが実行される脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000111.html
Windows XPカーネルの脆弱性、すでに攻撃を確認
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525162/?ST=security
日本語入力ソフトのオンライン機能に注意、企業の重要情報が外部に送信される恐れ
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525422/?ST=security
キヤノンIT、メール/Webを介した情報漏えい対策ソフトの新版を発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525386/?ST=security
EMCジャパン、エンドポイントのマルウエア感染を調べるソフトを発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525302/?ST=security
NSAの通話記録収集を地裁が「違憲」と判断---米メディアが報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525202/?ST=security
REMOTE: Ability Mail Server 2013 (3.1.1) - Stored XSS
http://www.exploit-db.com/exploits/30373
LOCAL: Nvidia (nvsvc) Display Driver Service Local Privilege Escalation
http://www.exploit-db.com/exploits/30393
LOCAL: FileMaster SY-IT v3.1 iOS - Multiple Web Vulnerabilities
http://www.exploit-db.com/exploits/30375
LOCAL: QuickHeal AntiVirus 7.0.0.1 - Stack Overflow Vulnerability
http://www.exploit-db.com/exploits/30374
http://rhn.redhat.com/errata/RHSA-2013-1850.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6052
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6054
+ Wireshark 1.10.4 released
http://www.wireshark.org/docs/relnotes/wireshark-1.10.4.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114
+ HPSBHF02953 rev.1 - HP B-series SAN Network Advisor, Remote Code Execution
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04045640-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
+ UPDATE: HPSBPI02938 rev.2 - Certain HP LaserJet Printers, Remote Denial of Service (DoS)
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04041432-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ Multiple Buffer Errors vulnerability in LibTIFF
https://blogs.oracle.com/sunsecurity/entry/multiple_buffer_errors_vulnerability_in
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
+ CVE-2012-4564 Design Error vulnerability in LibTIFF
https://blogs.oracle.com/sunsecurity/entry/cve_2012_4564_design_error1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
+ Multiple Cryptographic Issues vulnerabilities in Ruby
https://blogs.oracle.com/sunsecurity/entry/multiple_cryptographic_issues_vulnerabilities_in
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363
+ CVE-2013-4475 Access Control vulnerability in Samba
https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
+ Multiple vulnerabilities in Wireshark
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark8
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340
+ curl and libcurl 7.34.0 released
http://curl.haxx.se/changes.html#7_34_0
+ Red Hat JBoss Portal Input Validation Flaw Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1029510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4424
+ Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
http://www.securitytracker.com/id/1029505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5228
+ REMOTE: Adobe Reader ToolButton Use After Free
http://www.exploit-db.com/exploits/30394
+ LOCAL: Microsoft Windows ndproxy.sys Local Privilege Escalation
http://www.exploit-db.com/exploits/30392
+ DoS/PoC: PHP openssl_x509_parse() Memory Corruption Vulnerability
http://www.exploit-db.com/exploits/30395
+ DoS/PoC: MS13-101 Windows Kernel win32k.sys - Integer Overflow
http://www.exploit-db.com/exploits/30397
+ Microsoft Windows ndproxy.sys Privilege Escalation Exploit
http://cxsecurity.com/issue/WLB-2013120125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
+ Microsoft Windows NDPROXY Local SYSTEM Privilege Escalation
http://cxsecurity.com/issue/WLB-2013120040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
+ Windows Kernel win32k.sys Integer Overflow (MS13-101)
http://cxsecurity.com/issue/WLB-2013120087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5058
+ SA56144 Apple OS X Multiple Vulnerabilities
http://secunia.com/advisories/56144/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5228
[更新]ウイルス検索エンジン VSAPI 9.750 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2006
Trend Micro Network VirusWall Enforcer 1500i/3500i/3600i バージョン 3.x Critical Patch (Build 1023) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2049
Trend Micro Network VirusWall Enforcer 2500 バージョン 2.0 Critical Patch (Build 1106) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2047
DBConvert / DBSync for PostgreSQL and Oracle released
http://www.postgresql.org/about/news/1496/
JVNDB-2013-000111 Android OS において任意の Java のメソッドが実行される脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000111.html
Windows XPカーネルの脆弱性、すでに攻撃を確認
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525162/?ST=security
日本語入力ソフトのオンライン機能に注意、企業の重要情報が外部に送信される恐れ
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525422/?ST=security
キヤノンIT、メール/Webを介した情報漏えい対策ソフトの新版を発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525386/?ST=security
EMCジャパン、エンドポイントのマルウエア感染を調べるソフトを発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525302/?ST=security
NSAの通話記録収集を地裁が「違憲」と判断---米メディアが報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131217/525202/?ST=security
REMOTE: Ability Mail Server 2013 (3.1.1) - Stored XSS
http://www.exploit-db.com/exploits/30373
LOCAL: Nvidia (nvsvc) Display Driver Service Local Privilege Escalation
http://www.exploit-db.com/exploits/30393
LOCAL: FileMaster SY-IT v3.1 iOS - Multiple Web Vulnerabilities
http://www.exploit-db.com/exploits/30375
LOCAL: QuickHeal AntiVirus 7.0.0.1 - Stack Overflow Vulnerability
http://www.exploit-db.com/exploits/30374
2013年12月17日火曜日
17日 火曜日、先勝
+ Android-x86 4.4.1 released
http://www.android-x86.org/
+ RHSA-2013:1829 Important: nss, nspr, and nss-util security update
http://rhn.redhat.com/errata/RHSA-2013-1829.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
+ RHSA-2013:1801 Important: kernel security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1801.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368
+ RHSA-2013:1823 Important: thunderbird security update
http://rhn.redhat.com/errata/RHSA-2013-1823.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
+ RHSA-2013:1813 Critical: php53 and php security update
http://rhn.redhat.com/errata/RHSA-2013-1813.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
+ RHSA-2013:1812 Critical: firefox security update
http://rhn.redhat.com/errata/RHSA-2013-1812.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
+ RHSA-2013:1805 Important: samba4 security update
http://rhn.redhat.com/errata/RHSA-2013-1805.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
+ RHSA-2013:1803 Moderate: libjpeg-turbo security update
http://rhn.redhat.com/errata/RHSA-2013-1803.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630
+ RHSA-2013:1806 Important: samba and samba3x security update
http://rhn.redhat.com/errata/RHSA-2013-1806.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
+ About the security content of OS X Mavericks v10.9.1
http://support.apple.com/kb/HT6084
+ About the security content of Safari 6.1.1 and Safari 7.0.1
http://support.apple.com/kb/HT6082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5228
+ Mozilla Firefox 26.0 released
http://www.mozilla.org/en-US/firefox/26.0/releasenotes/
+ Mozilla Thunderbird 24.2 released
+ MFSA 2013-117 Mis-issued ANSSI/DCSSI certificate
http://www.mozilla.org/security/announce/2013/mfsa2013-117.html
+ MFSA 2013-116 JPEG information leak
http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
+ MFSA 2013-115 GetElementIC typed array stubs can be generated outside observed typesets
http://www.mozilla.org/security/announce/2013/mfsa2013-115.html
+ MFSA 2013-114 Use-after-free in synthetic mouse movement
http://www.mozilla.org/security/announce/2013/mfsa2013-114.html
+ MFSA 2013-113 Trust settings for built-in roots ignored during EV certificate validation
http://www.mozilla.org/security/announce/2013/mfsa2013-113.html
+ MFSA 2013-112 Linux clipboard information disclosure though selection paste
http://www.mozilla.org/security/announce/2013/mfsa2013-112.html
+ MFSA 2013-111 Segmentation violation when replacing ordered list elements
http://www.mozilla.org/security/announce/2013/mfsa2013-111.html
+ MFSA 2013-110 Potential overflow in JavaScript binary search algorithms
http://www.mozilla.org/security/announce/2013/mfsa2013-110.html
+ MFSA 2013-109 Use-after-free during Table Editing
http://www.mozilla.org/security/announce/2013/mfsa2013-109.html
+ MFSA 2013-108 Use-after-free in event listeners
http://www.mozilla.org/security/announce/2013/mfsa2013-108.html
+ MFSA 2013-107 Sandbox restrictions not applied to nested object elements
http://www.mozilla.org/security/announce/2013/mfsa2013-107.html
+ MFSA 2013-106 Character encoding cross-origin XSS attack
http://www.mozilla.org/security/announce/2013/mfsa2013-106.html
+ MFSA 2013-105 Application Installation doorhanger persists on navigation
http://www.mozilla.org/security/announce/2013/mfsa2013-105.html
+ MFSA 2013-104 Miscellaneous memory safety hazards (rv:26.0 / rv:24.2)
http://www.mozilla.org/security/announce/2013/mfsa2013-104.html
+ CESA-2013:1812 Critical CentOS 6 firefox Update
http://lwn.net/Alerts/576882/
+ CESA-2013:1801 Important CentOS 6 kernel Update
http://lwn.net/Alerts/576883/
+ CESA-2013:1829 Important CentOS 6 nss-util Update
http://lwn.net/Alerts/576884/
+ CESA-2013:1829 Important CentOS 6 nss Update
http://lwn.net/Alerts/576885/
+ CESA-2013:1823 Important CentOS 6 thunderbird Update
http://lwn.net/Alerts/576887/
+ CESA-2013:1829 Important CentOS 6 nspr Update
http://lwn.net/Alerts/576886/
+ CESA-2013:1813 Critical CentOS 6 php Update
http://lwn.net/Alerts/576587/
+ CESA-2013:1813 Critical CentOS 5 php53 Update
http://lwn.net/Alerts/576589/
+ CESA-2013:1812 Critical CentOS 5 firefox Update
http://lwn.net/Alerts/576590/
+ CESA-2013:1814 Critical CentOS 5 php Update
http://lwn.net/Alerts/576588/
+ CESA-2013:1823 Important CentOS 5 thunderbird Update
http://lwn.net/Alerts/576745/
+ CESA-2013:1804 Moderate CentOS 5 libjpeg Update
http://lwn.net/Alerts/576387/
+ CESA-2013:1805 Important CentOS 6 samba4 Update
http://lwn.net/Alerts/576391/
+ CESA-2013:1803 Moderate CentOS 6 libjpeg-turbo Update
http://lwn.net/Alerts/576388/
+ CESA-2013:1806 Important CentOS 6 samba Update
http://lwn.net/Alerts/576389/
+ CESA-2013:1806 Important CentOS 5 samba3x Update
http://lwn.net/Alerts/576390/
+ CESA-2013:X017 Xen4CentOS xen Security Update
http://lwn.net/Alerts/576586/
+ CESA-2013:1790 Moderate CentOS 5 kernel Update
http://lwn.net/Alerts/575985/
+ CESA-2013:1791 Important CentOS 5 nss Update
http://lwn.net/Alerts/575986/
+ CESA-2013:1791 Important CentOS 5 nspr Update
http://lwn.net/Alerts/575987/
+ phpMyAdmin 4.1.0 is released
http://sourceforge.net/p/phpmyadmin/news/2013/12/phpmyadmin-410-is-released/
+ UPDATE: Multiple Vulnerabilities in Cisco ASA Software
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa
+ Linux kernel 3.12.5, 3.10.24, 3.4.74 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.5
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.24
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.74
+ Multiple vulnerabilities in Wireshark
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark7
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2916652) 不適切に発行されたデジタル証明書により、なりすましが行われる
http://technet.microsoft.com/ja-jp/security/advisory/2916652
+ マイクロソフト セキュリティ アドバイザリ (2915720) Windows Authenticode 署名検証の変更
http://technet.microsoft.com/ja-jp/security/advisory/2915720
+ マイクロソフト セキュリティ アドバイザリ (2905247) ASP.NET のサイト構成が安全ではないため、特権が昇格される
http://technet.microsoft.com/ja-jp/security/advisory/2905247
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2896666) Microsoft Graphics コンポーネントの脆弱性により、リモートでコードが実行される
http://technet.microsoft.com/ja-jp/security/advisory/2896666
+ マイクロソフト セキュリティ アドバイザリ (2871690) 非準拠の UEFI モジュールを失効させる更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2871690
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2755801
+ Apache Struts 2.3.16 released
http://struts.apache.org/release/2.3.x/docs/version-notes-2316.html
+ nkf Network Kanji Filter 2.1.3 released
http://sourceforge.jp/projects/nkf/
+ PHP 5.5.7, 5.4.23, 5.3.28 released
http://www.php.net/archive/2013.php#id2013-12-12-1
http://www.php.net/archive/2013.php#id2013-12-12-3
http://www.php.net/archive/2013.php#id2013-12-12-2
+ Samba 4.1.3, 4.0.13 and 3.6.22 Security Releases Available for Download
http://www.samba.org/samba/history/samba-4.1.3.html
+ PHP 5.5.6/5.4.22 openssl_x509_parse() Memory Corruption
http://cxsecurity.com/issue/WLB-2013120114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
[更新]ウイルス検索エンジン VSAPI 9.750 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2006
ウイルスバスター コーポレートエディションの各プラグインのサポート終了日について
http://app.trendmicro.co.jp/support/news.asp?id=2045
[更新]ダメージクリーンナップエンジン 7.1 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2020
Deep Discovery Inspector 3.2 Patch 1 (Build 1018) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2044
Database .NET 10 released!
http://www.postgresql.org/about/news/1495/
JVNDB-2013-000119 Juniper ScreenOS におけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000119.html
JVNDB-2013-000118 サイボウズ デヂエにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000118.html
チェックしておきたい脆弱性情報<2013.12.18>
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525002/?ST=security
NRIセキュアが標的型攻撃に備える「CSIRT」支援を体系化、1年で大手5社の獲得目指す
http://itpro.nikkeibp.co.jp/article/NEWS/20131213/524762/?ST=security
アミティエ、クラウドと連携するホスト型IPSサービス「攻撃遮断くん」を開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131213/524747/?ST=security
パッチ未適用のPCは4分しかもたない。攻撃の激しさ再認識を
NRIセキュアテクノロジーズ テクニカルコンサルティング部
主任セキュリティコンサルタント 上田健吾氏
同セキュリティコンサルタント 大塚淳平氏
http://itpro.nikkeibp.co.jp/article/Interview/20131205/522823/?ST=security
VU#586958 SketchUp Viewer buffer overflow vulnerability
http://www.kb.cert.org/vuls/id/586958
http://www.android-x86.org/
+ RHSA-2013:1829 Important: nss, nspr, and nss-util security update
http://rhn.redhat.com/errata/RHSA-2013-1829.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
+ RHSA-2013:1801 Important: kernel security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1801.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6368
+ RHSA-2013:1823 Important: thunderbird security update
http://rhn.redhat.com/errata/RHSA-2013-1823.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
+ RHSA-2013:1813 Critical: php53 and php security update
http://rhn.redhat.com/errata/RHSA-2013-1813.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
+ RHSA-2013:1812 Critical: firefox security update
http://rhn.redhat.com/errata/RHSA-2013-1812.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671
+ RHSA-2013:1805 Important: samba4 security update
http://rhn.redhat.com/errata/RHSA-2013-1805.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
+ RHSA-2013:1803 Moderate: libjpeg-turbo security update
http://rhn.redhat.com/errata/RHSA-2013-1803.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630
+ RHSA-2013:1806 Important: samba and samba3x security update
http://rhn.redhat.com/errata/RHSA-2013-1806.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
+ About the security content of OS X Mavericks v10.9.1
http://support.apple.com/kb/HT6084
+ About the security content of Safari 6.1.1 and Safari 7.0.1
http://support.apple.com/kb/HT6082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5228
+ Mozilla Firefox 26.0 released
http://www.mozilla.org/en-US/firefox/26.0/releasenotes/
+ Mozilla Thunderbird 24.2 released
+ MFSA 2013-117 Mis-issued ANSSI/DCSSI certificate
http://www.mozilla.org/security/announce/2013/mfsa2013-117.html
+ MFSA 2013-116 JPEG information leak
http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
+ MFSA 2013-115 GetElementIC typed array stubs can be generated outside observed typesets
http://www.mozilla.org/security/announce/2013/mfsa2013-115.html
+ MFSA 2013-114 Use-after-free in synthetic mouse movement
http://www.mozilla.org/security/announce/2013/mfsa2013-114.html
+ MFSA 2013-113 Trust settings for built-in roots ignored during EV certificate validation
http://www.mozilla.org/security/announce/2013/mfsa2013-113.html
+ MFSA 2013-112 Linux clipboard information disclosure though selection paste
http://www.mozilla.org/security/announce/2013/mfsa2013-112.html
+ MFSA 2013-111 Segmentation violation when replacing ordered list elements
http://www.mozilla.org/security/announce/2013/mfsa2013-111.html
+ MFSA 2013-110 Potential overflow in JavaScript binary search algorithms
http://www.mozilla.org/security/announce/2013/mfsa2013-110.html
+ MFSA 2013-109 Use-after-free during Table Editing
http://www.mozilla.org/security/announce/2013/mfsa2013-109.html
+ MFSA 2013-108 Use-after-free in event listeners
http://www.mozilla.org/security/announce/2013/mfsa2013-108.html
+ MFSA 2013-107 Sandbox restrictions not applied to nested object elements
http://www.mozilla.org/security/announce/2013/mfsa2013-107.html
+ MFSA 2013-106 Character encoding cross-origin XSS attack
http://www.mozilla.org/security/announce/2013/mfsa2013-106.html
+ MFSA 2013-105 Application Installation doorhanger persists on navigation
http://www.mozilla.org/security/announce/2013/mfsa2013-105.html
+ MFSA 2013-104 Miscellaneous memory safety hazards (rv:26.0 / rv:24.2)
http://www.mozilla.org/security/announce/2013/mfsa2013-104.html
+ CESA-2013:1812 Critical CentOS 6 firefox Update
http://lwn.net/Alerts/576882/
+ CESA-2013:1801 Important CentOS 6 kernel Update
http://lwn.net/Alerts/576883/
+ CESA-2013:1829 Important CentOS 6 nss-util Update
http://lwn.net/Alerts/576884/
+ CESA-2013:1829 Important CentOS 6 nss Update
http://lwn.net/Alerts/576885/
+ CESA-2013:1823 Important CentOS 6 thunderbird Update
http://lwn.net/Alerts/576887/
+ CESA-2013:1829 Important CentOS 6 nspr Update
http://lwn.net/Alerts/576886/
+ CESA-2013:1813 Critical CentOS 6 php Update
http://lwn.net/Alerts/576587/
+ CESA-2013:1813 Critical CentOS 5 php53 Update
http://lwn.net/Alerts/576589/
+ CESA-2013:1812 Critical CentOS 5 firefox Update
http://lwn.net/Alerts/576590/
+ CESA-2013:1814 Critical CentOS 5 php Update
http://lwn.net/Alerts/576588/
+ CESA-2013:1823 Important CentOS 5 thunderbird Update
http://lwn.net/Alerts/576745/
+ CESA-2013:1804 Moderate CentOS 5 libjpeg Update
http://lwn.net/Alerts/576387/
+ CESA-2013:1805 Important CentOS 6 samba4 Update
http://lwn.net/Alerts/576391/
+ CESA-2013:1803 Moderate CentOS 6 libjpeg-turbo Update
http://lwn.net/Alerts/576388/
+ CESA-2013:1806 Important CentOS 6 samba Update
http://lwn.net/Alerts/576389/
+ CESA-2013:1806 Important CentOS 5 samba3x Update
http://lwn.net/Alerts/576390/
+ CESA-2013:X017 Xen4CentOS xen Security Update
http://lwn.net/Alerts/576586/
+ CESA-2013:1790 Moderate CentOS 5 kernel Update
http://lwn.net/Alerts/575985/
+ CESA-2013:1791 Important CentOS 5 nss Update
http://lwn.net/Alerts/575986/
+ CESA-2013:1791 Important CentOS 5 nspr Update
http://lwn.net/Alerts/575987/
+ phpMyAdmin 4.1.0 is released
http://sourceforge.net/p/phpmyadmin/news/2013/12/phpmyadmin-410-is-released/
+ UPDATE: Multiple Vulnerabilities in Cisco ASA Software
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131009-asa
+ Linux kernel 3.12.5, 3.10.24, 3.4.74 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.5
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.24
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.74
+ Multiple vulnerabilities in Wireshark
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark7
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2916652) 不適切に発行されたデジタル証明書により、なりすましが行われる
http://technet.microsoft.com/ja-jp/security/advisory/2916652
+ マイクロソフト セキュリティ アドバイザリ (2915720) Windows Authenticode 署名検証の変更
http://technet.microsoft.com/ja-jp/security/advisory/2915720
+ マイクロソフト セキュリティ アドバイザリ (2905247) ASP.NET のサイト構成が安全ではないため、特権が昇格される
http://technet.microsoft.com/ja-jp/security/advisory/2905247
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2896666) Microsoft Graphics コンポーネントの脆弱性により、リモートでコードが実行される
http://technet.microsoft.com/ja-jp/security/advisory/2896666
+ マイクロソフト セキュリティ アドバイザリ (2871690) 非準拠の UEFI モジュールを失効させる更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2871690
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2755801
+ Apache Struts 2.3.16 released
http://struts.apache.org/release/2.3.x/docs/version-notes-2316.html
+ nkf Network Kanji Filter 2.1.3 released
http://sourceforge.jp/projects/nkf/
+ PHP 5.5.7, 5.4.23, 5.3.28 released
http://www.php.net/archive/2013.php#id2013-12-12-1
http://www.php.net/archive/2013.php#id2013-12-12-3
http://www.php.net/archive/2013.php#id2013-12-12-2
+ Samba 4.1.3, 4.0.13 and 3.6.22 Security Releases Available for Download
http://www.samba.org/samba/history/samba-4.1.3.html
+ PHP 5.5.6/5.4.22 openssl_x509_parse() Memory Corruption
http://cxsecurity.com/issue/WLB-2013120114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
[更新]ウイルス検索エンジン VSAPI 9.750 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2006
ウイルスバスター コーポレートエディションの各プラグインのサポート終了日について
http://app.trendmicro.co.jp/support/news.asp?id=2045
[更新]ダメージクリーンナップエンジン 7.1 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2020
Deep Discovery Inspector 3.2 Patch 1 (Build 1018) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2044
Database .NET 10 released!
http://www.postgresql.org/about/news/1495/
JVNDB-2013-000119 Juniper ScreenOS におけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000119.html
JVNDB-2013-000118 サイボウズ デヂエにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000118.html
チェックしておきたい脆弱性情報<2013.12.18>
http://itpro.nikkeibp.co.jp/article/COLUMN/20131216/525002/?ST=security
NRIセキュアが標的型攻撃に備える「CSIRT」支援を体系化、1年で大手5社の獲得目指す
http://itpro.nikkeibp.co.jp/article/NEWS/20131213/524762/?ST=security
アミティエ、クラウドと連携するホスト型IPSサービス「攻撃遮断くん」を開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131213/524747/?ST=security
パッチ未適用のPCは4分しかもたない。攻撃の激しさ再認識を
NRIセキュアテクノロジーズ テクニカルコンサルティング部
主任セキュリティコンサルタント 上田健吾氏
同セキュリティコンサルタント 大塚淳平氏
http://itpro.nikkeibp.co.jp/article/Interview/20131205/522823/?ST=security
VU#586958 SketchUp Viewer buffer overflow vulnerability
http://www.kb.cert.org/vuls/id/586958
2013年12月6日金曜日
6日 金曜日、友引
+ マイクロソフト セキュリティ情報の事前通知 - 2013 年 12 月
http://technet.microsoft.com/ja-jp/security/bulletin/ms13-dec
+ HPSBUX02944 rev.1 - HP-UX Running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04031212-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5846
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5854
+ HPSBUX02943 rev.1 - HP-UX Running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04031205-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5852
+ PostgreSQL Maintenance Releases: 9.3.2, 9.2.6, 9.1.11, 9.0.15, and 8.4.19
http://www.postgresql.org/about/news/1492/
http://www.postgresql.org/docs/9.3/static/release-9-3-2.html
http://www.postgresql.org/docs/9.2/static/release-9-2-6.html
http://www.postgresql.org/docs/9.1/static/release-9-1-11.html
http://www.postgresql.org/docs/9.0/static/release-9-0-15.html
http://www.postgresql.org/docs/8.4/static/release-8-4-19.html
+ SonicWALL GMS/Analyzer/UMA Input Validation Flaw in 'Alert Settings' Request Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1029433
+ SA55942 Google Chrome Multiple Vulnerabilities
http://secunia.com/advisories/55942/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6637
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6638
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640
+ Microsoft Windows NDPROXY Local SYSTEM Privilege Escalation
http://cxsecurity.com/issue/WLB-2013120040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
Microsoft、政府の盗聴行為への対抗策としてサービス暗号化を強化
http://itpro.nikkeibp.co.jp/article/NEWS/20131206/523045/?ST=security
世界のセキュリティ・ラボから
非暗号化HTTPはもうすぐ消える?
http://itpro.nikkeibp.co.jp/article/COLUMN/20131205/522844/?ST=security
サイバー攻撃の進化とセキュリティ対策意識に大きな乖離
ファイア・アイ 最高技術責任者 三輪信雄氏
http://itpro.nikkeibp.co.jp/article/Interview/20131128/521326/?ST=security
ジャパネットたかた、テレビ映像にIDを埋め込み「詳しくはWebで」をスマホカメラで簡単に
http://itpro.nikkeibp.co.jp/article/NEWS/20131205/522824/?ST=security
Facebookのログイン情報など200万件が流出、米セキュリティ会社が確認
http://itpro.nikkeibp.co.jp/article/NEWS/20131205/522762/?ST=security
JVNVU#92648323 NagiosQL にクロスサイトスクリプティングの脆弱性
http://jvn.jp/cert/JVNVU92648323/index.html
VU#268662 NagiosQL 3.2 Service Pack 2 contains a reflected cross-site scripting vulnerability
http://www.kb.cert.org/vuls/id/268662
http://technet.microsoft.com/ja-jp/security/bulletin/ms13-dec
+ HPSBUX02944 rev.1 - HP-UX Running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04031212-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5810
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5846
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5854
+ HPSBUX02943 rev.1 - HP-UX Running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04031205-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5852
+ PostgreSQL Maintenance Releases: 9.3.2, 9.2.6, 9.1.11, 9.0.15, and 8.4.19
http://www.postgresql.org/about/news/1492/
http://www.postgresql.org/docs/9.3/static/release-9-3-2.html
http://www.postgresql.org/docs/9.2/static/release-9-2-6.html
http://www.postgresql.org/docs/9.1/static/release-9-1-11.html
http://www.postgresql.org/docs/9.0/static/release-9-0-15.html
http://www.postgresql.org/docs/8.4/static/release-8-4-19.html
+ SonicWALL GMS/Analyzer/UMA Input Validation Flaw in 'Alert Settings' Request Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1029433
+ SA55942 Google Chrome Multiple Vulnerabilities
http://secunia.com/advisories/55942/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6637
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6638
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640
+ Microsoft Windows NDPROXY Local SYSTEM Privilege Escalation
http://cxsecurity.com/issue/WLB-2013120040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
Microsoft、政府の盗聴行為への対抗策としてサービス暗号化を強化
http://itpro.nikkeibp.co.jp/article/NEWS/20131206/523045/?ST=security
世界のセキュリティ・ラボから
非暗号化HTTPはもうすぐ消える?
http://itpro.nikkeibp.co.jp/article/COLUMN/20131205/522844/?ST=security
サイバー攻撃の進化とセキュリティ対策意識に大きな乖離
ファイア・アイ 最高技術責任者 三輪信雄氏
http://itpro.nikkeibp.co.jp/article/Interview/20131128/521326/?ST=security
ジャパネットたかた、テレビ映像にIDを埋め込み「詳しくはWebで」をスマホカメラで簡単に
http://itpro.nikkeibp.co.jp/article/NEWS/20131205/522824/?ST=security
Facebookのログイン情報など200万件が流出、米セキュリティ会社が確認
http://itpro.nikkeibp.co.jp/article/NEWS/20131205/522762/?ST=security
JVNVU#92648323 NagiosQL にクロスサイトスクリプティングの脆弱性
http://jvn.jp/cert/JVNVU92648323/index.html
VU#268662 NagiosQL 3.2 Service Pack 2 contains a reflected cross-site scripting vulnerability
http://www.kb.cert.org/vuls/id/268662
2013年12月5日木曜日
5日 木曜日、先勝
+ Google Chrome 31.0.1650.63 released
http://googlechromereleases.blogspot.jp/2013/12/stable-channel-update.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6637
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6638
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640
+ CESA-2013:1778 Moderate CentOS 6 gimp Update
http://lwn.net/Alerts/575603/
+ CESA-2013:1778 Moderate CentOS 5 gimp Update
http://lwn.net/Alerts/575604/
+ CESA-2013:1779 Moderate CentOS 6 mod_nss Update
http://lwn.net/Alerts/575605/
+ CESA-2013:1779 Moderate CentOS 5 mod_nss Update
http://lwn.net/Alerts/575606/
+ phpMyAdmin 4.0.10 is released
http://sourceforge.net/p/phpmyadmin/news/2013/12/phpmyadmin-4010-is-released/
+ Linux kernel 3.12.3, 3.10.22, 3.4.72 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.22
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.72
+ VMSA-2013-0014 VMware Workstation, Fusion, ESXi and ESX patches address a guest privilege escalation
http://www.vmware.com/security/advisories/VMSA-2013-0014.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
+ VMware Workstation/Fusion Bug in 'lgtosync.sys' Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
+ VMware ESX/ESXi Bug in 'lgtosync.sys' Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
+ Windows Kernel Bug in IsHandleEntrySecure() Lets Local Users Deny Service
http://www.securitytracker.com/id/1029426
+ LOCAL: Windows NDPROXY Local SYSTEM Privilege Escalation
http://www.exploit-db.com/exploits/30014
+ DoS/PoC: MySQL 5.0.x IF Query Handling Remote Denial Of Service Vulnerability
http://www.exploit-db.com/exploits/30020
+ SA55922 Linux Kernel Multiple Vulnerabilities
http://secunia.com/advisories/55922/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929
+ SA55684 VMware Multiple Products LGTOSYNC Guest Privilege Escalation Vulnerability
http://secunia.com/advisories/55684/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
Deep Discovery Inspector 3.5 Critical Patch (Build 1013) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2042
Trend Micro Network VirusWall Enforcer 1200 バージョン 2.0 Critical Patch (Build 1046) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2043
日本を守る「七人の侍」
「卵」育てる試み、日本でも始まる
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518341/?ST=security
JVNVU#98848993 AT&T Connect Participant Application for Windows にバッファオーバーフローの脆弱性
http://jvn.jp/cert/JVNVU98848993/index.html
http://googlechromereleases.blogspot.jp/2013/12/stable-channel-update.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6636
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6637
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6638
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640
+ CESA-2013:1778 Moderate CentOS 6 gimp Update
http://lwn.net/Alerts/575603/
+ CESA-2013:1778 Moderate CentOS 5 gimp Update
http://lwn.net/Alerts/575604/
+ CESA-2013:1779 Moderate CentOS 6 mod_nss Update
http://lwn.net/Alerts/575605/
+ CESA-2013:1779 Moderate CentOS 5 mod_nss Update
http://lwn.net/Alerts/575606/
+ phpMyAdmin 4.0.10 is released
http://sourceforge.net/p/phpmyadmin/news/2013/12/phpmyadmin-4010-is-released/
+ Linux kernel 3.12.3, 3.10.22, 3.4.72 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.22
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.72
+ VMSA-2013-0014 VMware Workstation, Fusion, ESXi and ESX patches address a guest privilege escalation
http://www.vmware.com/security/advisories/VMSA-2013-0014.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
+ VMware Workstation/Fusion Bug in 'lgtosync.sys' Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
+ VMware ESX/ESXi Bug in 'lgtosync.sys' Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
+ Windows Kernel Bug in IsHandleEntrySecure() Lets Local Users Deny Service
http://www.securitytracker.com/id/1029426
+ LOCAL: Windows NDPROXY Local SYSTEM Privilege Escalation
http://www.exploit-db.com/exploits/30014
+ DoS/PoC: MySQL 5.0.x IF Query Handling Remote Denial Of Service Vulnerability
http://www.exploit-db.com/exploits/30020
+ SA55922 Linux Kernel Multiple Vulnerabilities
http://secunia.com/advisories/55922/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2929
+ SA55684 VMware Multiple Products LGTOSYNC Guest Privilege Escalation Vulnerability
http://secunia.com/advisories/55684/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3519
Deep Discovery Inspector 3.5 Critical Patch (Build 1013) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2042
Trend Micro Network VirusWall Enforcer 1200 バージョン 2.0 Critical Patch (Build 1046) 公開のお知らせ
http://app.trendmicro.co.jp/support/news.asp?id=2043
日本を守る「七人の侍」
「卵」育てる試み、日本でも始まる
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518341/?ST=security
JVNVU#98848993 AT&T Connect Participant Application for Windows にバッファオーバーフローの脆弱性
http://jvn.jp/cert/JVNVU98848993/index.html
2013年12月4日水曜日
4日 水曜日、赤口
+ RHSA-2013:1779 Moderate: mod_nss security update
http://rhn.redhat.com/errata/RHSA-2013-1779.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4566
+ RHSA-2013:1778 Moderate: gimp security update
http://rhn.redhat.com/errata/RHSA-2013-1778.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978
+ squid 3.3.11 released
http://www.squid-cache.org/Versions/v3/3.3/RELEASENOTES.html
+ MySQL 5.1.73 released
http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-73.html
+ SA55633 Microsoft Windows "IsHandleEntrySecure()" Denial of Service Vulnerability
http://secunia.com/advisories/55633/
+ OpenSSL BN (multiprecision integer arithmetics) Multiple issues
http://cxsecurity.com/issue/WLB-2013120025
+ REMOTE: Cisco Prime Data Center Network Manager Arbitrary File Upload
http://www.exploit-db.com/exploits/30008
+ REMOTE: Microsoft Tagged Image File Format (TIFF) Integer Overflow
http://www.exploit-db.com/exploits/30011
JVNDB-2013-000117 サイボウズ ガルーンにおけるセッション固定の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000117.html
JVNDB-2013-000116 サイボウズ ガルーンにおけるメールヘッダインジェクションの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000116.html
JVNDB-2013-000115 サイボウズ ガルーンにおけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000115.html
JVNDB-2013-000114 サイボウズ ガルーンにおける SQL インジェクションの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000114.html
JVNDB-2013-000113 サイボウズ ガルーンにおける複数のクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000113.html
日本を守る「七人の侍」
サイバー攻撃の兆候をつかむ、ネットワークの監視官(インスペクター)
インターネットイニシアティブ(IIJ) サービスオペレーション本部 サービスオペレーション部 セキュリティマネジメント課 原 慎也 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518340/?ST=security
「詐欺Androidアプリを自動生成できる統合環境が無料入手可能に」、トレンドマイクロ
http://itpro.nikkeibp.co.jp/article/NEWS/20131203/522442/?ST=security
複合機からの情報漏洩が相次ぐ
サーバーと同様の対策が必要
http://itpro.nikkeibp.co.jp/article/COLUMN/20131122/519972/?ST=security
VU#346278 AT&T Connect Participant Application for Windows v9.5.35 contains a stack-based buffer overflow vulnerability
http://www.kb.cert.org/vuls/id/346278
REMOTE: ABB MicroSCADA wserver.exe Remote Code Execution
http://www.exploit-db.com/exploits/30009
REMOTE: Kimai v0.9.2 'db_restore.php' SQL Injection
http://www.exploit-db.com/exploits/30010
LOCAL: Notepad++ Plugin Notepad# 1.5 - Local Exploit
http://www.exploit-db.com/exploits/30007
http://rhn.redhat.com/errata/RHSA-2013-1779.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4566
+ RHSA-2013:1778 Moderate: gimp security update
http://rhn.redhat.com/errata/RHSA-2013-1778.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978
+ squid 3.3.11 released
http://www.squid-cache.org/Versions/v3/3.3/RELEASENOTES.html
+ MySQL 5.1.73 released
http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-73.html
+ SA55633 Microsoft Windows "IsHandleEntrySecure()" Denial of Service Vulnerability
http://secunia.com/advisories/55633/
+ OpenSSL BN (multiprecision integer arithmetics) Multiple issues
http://cxsecurity.com/issue/WLB-2013120025
+ REMOTE: Cisco Prime Data Center Network Manager Arbitrary File Upload
http://www.exploit-db.com/exploits/30008
+ REMOTE: Microsoft Tagged Image File Format (TIFF) Integer Overflow
http://www.exploit-db.com/exploits/30011
JVNDB-2013-000117 サイボウズ ガルーンにおけるセッション固定の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000117.html
JVNDB-2013-000116 サイボウズ ガルーンにおけるメールヘッダインジェクションの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000116.html
JVNDB-2013-000115 サイボウズ ガルーンにおけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000115.html
JVNDB-2013-000114 サイボウズ ガルーンにおける SQL インジェクションの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000114.html
JVNDB-2013-000113 サイボウズ ガルーンにおける複数のクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000113.html
日本を守る「七人の侍」
サイバー攻撃の兆候をつかむ、ネットワークの監視官(インスペクター)
インターネットイニシアティブ(IIJ) サービスオペレーション本部 サービスオペレーション部 セキュリティマネジメント課 原 慎也 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518340/?ST=security
「詐欺Androidアプリを自動生成できる統合環境が無料入手可能に」、トレンドマイクロ
http://itpro.nikkeibp.co.jp/article/NEWS/20131203/522442/?ST=security
複合機からの情報漏洩が相次ぐ
サーバーと同様の対策が必要
http://itpro.nikkeibp.co.jp/article/COLUMN/20131122/519972/?ST=security
VU#346278 AT&T Connect Participant Application for Windows v9.5.35 contains a stack-based buffer overflow vulnerability
http://www.kb.cert.org/vuls/id/346278
REMOTE: ABB MicroSCADA wserver.exe Remote Code Execution
http://www.exploit-db.com/exploits/30009
REMOTE: Kimai v0.9.2 'db_restore.php' SQL Injection
http://www.exploit-db.com/exploits/30010
LOCAL: Notepad++ Plugin Notepad# 1.5 - Local Exploit
http://www.exploit-db.com/exploits/30007
2013年12月3日火曜日
3日 火曜日、大安
+ MySQL 5.6.15, 5.5.35 released
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-15.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-35.html
Zimbra Newsletter - November 2013
http://telligent.com/company/news/b/newsletters/archive/2013/12/02/zimbra-newsletter-november-2013.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1385078863228.1386028386719.17&__hssc=122069652.1.1386028386719&__hsfp=3431610341
Register Now for Upcoming Webinar ? Collaboration + Always On Discussion
http://telligent.com/company/news/b/teamblog/archive/2013/12/02/register-now-for-upcoming-webinar-collaboration-always-on-discussion.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1385078863228.1386028386719.17&__hssc=122069652.1.1386028386719&__hsfp=3431610341
日経コンピュータReport
複合機からの情報漏洩が相次ぐ
サーバーと同様の対策が必要
http://itpro.nikkeibp.co.jp/article/COLUMN/20131122/519972/?ST=security
日本を守る「七人の侍」
消費者のプライバシーを守れ、スマートフォンの守護者(ガーディアン)
KDDI研究所 ネットワークセキュリティグループ 研究主査 磯原 隆将 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518339/?ST=security
シアンス・アール、ポータブル型の情報漏えい痕跡調査ツールを販売
http://itpro.nikkeibp.co.jp/article/NEWS/20131202/521970/?ST=security
「Nexus」の一部モデルで大量SMS攻撃に対する脆弱性、米メディアの報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131202/521843/?ST=security
VU#346982 EMC Document Sciences xPression contains multiple vulnerabilities
http://www.kb.cert.org/vuls/id/346982
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-15.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-35.html
Zimbra Newsletter - November 2013
http://telligent.com/company/news/b/newsletters/archive/2013/12/02/zimbra-newsletter-november-2013.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1385078863228.1386028386719.17&__hssc=122069652.1.1386028386719&__hsfp=3431610341
Register Now for Upcoming Webinar ? Collaboration + Always On Discussion
http://telligent.com/company/news/b/teamblog/archive/2013/12/02/register-now-for-upcoming-webinar-collaboration-always-on-discussion.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1385078863228.1386028386719.17&__hssc=122069652.1.1386028386719&__hsfp=3431610341
日経コンピュータReport
複合機からの情報漏洩が相次ぐ
サーバーと同様の対策が必要
http://itpro.nikkeibp.co.jp/article/COLUMN/20131122/519972/?ST=security
日本を守る「七人の侍」
消費者のプライバシーを守れ、スマートフォンの守護者(ガーディアン)
KDDI研究所 ネットワークセキュリティグループ 研究主査 磯原 隆将 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518339/?ST=security
シアンス・アール、ポータブル型の情報漏えい痕跡調査ツールを販売
http://itpro.nikkeibp.co.jp/article/NEWS/20131202/521970/?ST=security
「Nexus」の一部モデルで大量SMS攻撃に対する脆弱性、米メディアの報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131202/521843/?ST=security
VU#346982 EMC Document Sciences xPression contains multiple vulnerabilities
http://www.kb.cert.org/vuls/id/346982
2013年12月2日月曜日
2日 月曜日、先負
+ CentOS 6.5 released
http://wiki.centos.org/Manuals/ReleaseNotes/CentOS6.5
+ PDFCreator 1.7.2 released
http://www.pdfforge.org/blog/pdfcreator-172-released
+ HPSBGN02942 rev.2 - HP Service Manager and ServiceCenter, Remote Code Execution
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04026812-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4844
+ Linux kernel 3.12.2, 3.11.10, 3.10.21, 3.4.71 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.10
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.21
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.71
+ Google Nexus SMS Processing Flaw Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029414
+ Linux Kernel Buffer Read Error in ieee80211_radiotap_iterator_init() Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029413
+ Linux Kernel Networking recvmsg Memory Leak Lets Local Users Obtain Portions of Kernel Memory
http://www.securitytracker.com/id/1029412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405
+ Microsoft Enhanced Mitigation Experience Toolkit Lets Users Bypass ASLR Protections
http://www.securitytracker.com/id/1029411
+ Google Android 'com.android.settings' Lets Local Applications Remote Device Locks
http://www.securitytracker.com/id/1029410
+ PHP parse_iso_intervals Buffer Read Error May Let Remote Users Deny Service
http://www.securitytracker.com/id/1029409
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712
+ Kingsoft Office Writer 2012 8.1.0.3385 Buffer Overflow
http://cxsecurity.com/issue/WLB-2013120002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3934
+ SA55606 Linux Kernel Radiotap Header Processing Denial of Service Vulnerability
http://secunia.com/advisories/55606/
+ Linux Kernel 'ieee80211_radiotap_iterator_init()' Function Denial of Service Vulnerability
http://www.securityfocus.com/bid/64013
JVNDB-2013-000112 改造版 TOWN におけるディレクトリトラバーサルの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000112.html
日本を守る「七人の侍」
ユーザーの不正からシステムを守る、オンラインゲームの門番(ゲートキーパー)
ネットエージェント サービス事業部 研究開発グループ 秋月 康志 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518338/?ST=security
AppleのiOSを巡るプライバシー訴訟、地裁が訴えを棄却
http://itpro.nikkeibp.co.jp/article/NEWS/20131129/521542/?ST=security
Googleのプライバシーポリシー、オランダのデータ保護当局が「違法」と判断
http://itpro.nikkeibp.co.jp/article/NEWS/20131129/521522/?ST=security
世界のセキュリティ・ラボから
2014年の8大セキュリティ脅威予測
http://itpro.nikkeibp.co.jp/article/COLUMN/20131125/520507/?ST=security
Microsoftがサービスの暗号化強化を検討中---海外メディアの報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131129/521463/?ST=security
チェックしておきたい脆弱性情報<2013.11.29>
http://itpro.nikkeibp.co.jp/article/COLUMN/20131125/520505/?ST=security
DoS/PoC: TP-Link TL-WR740N / TL-WR740ND - 150M Wireless Lite N Router HTTP DoS
http://www.exploit-db.com/exploits/29919
DoS/PoC: Uptime Agent 5.0.1 - Stack Overflow Vulnerability
http://www.exploit-db.com/exploits/29920
DoS/PoC: ZIP Password Recovery Professional 5.1 (.zip) - Crash POC
http://www.exploit-db.com/exploits/29934
2013年11月29日金曜日
29日 金曜日、赤口
+ Linux kernel 3.2.53 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.53
+ Cisco IOS XR SNMP Memory Leak Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6700
+ Cisco IOS XE MPLS Processing Flaw Let Remote Users Deny Service
http://www.securitytracker.com/id/1029407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6706
+ Windows NDPROXY Driver Flaw Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
Linux Kernel Buffer Overflow in qeth_snmp_command() Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
+ REMOTE: MS13-090 CardSpaceClaimCollection ActiveX Integer Underflow
http://www.exploit-db.com/exploits/29857
+ REMOTE: MS12-022 Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
http://www.exploit-db.com/exploits/29858
+ REMOTE: Apache Roller OGNL Injection
http://www.exploit-db.com/exploits/29859
+ LOCAL: Adobe Acrobat Reader ASLR/DEP Bypass Exploit with SANDBOX BYPASS
http://www.exploit-db.com/exploits/29881
+ SA55809 Microsoft Windows NDProxy.sys Privilege Escalation Vulnerability
http://secunia.com/advisories/55809/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
+ AndroidOS 4.3 / com.android.settings Permission Bypass
http://cxsecurity.com/issue/WLB-2013110204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6271
+ Adobe Acrobat Reader ASLR/DEP Bypass Exploit with SANDBOX BYPASS
http://cxsecurity.com/issue/WLB-2013110202
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0640
+ Microsoft Tagged Image File Format (TIFF) Integer Overflow
http://cxsecurity.com/issue/WLB-2013110199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3906
+ Linux Kernel CVE-2013-6405 Memory Leak Multiple Local Information Disclosure Vulnerabilities
http://www.securityfocus.com/bid/63999
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405
2014年問題はコーポレートのリスク、経営トップは覚悟を
ラック 取締役最高技術責任者 西本逸郎氏
http://itpro.nikkeibp.co.jp/article/Interview/20131125/520483/?ST=security
パスワードはゲームに例えて理解する
http://itpro.nikkeibp.co.jp/article/COLUMN/20131126/520722/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[5]見知らぬ「友だち」が勝手に増殖してしまうという落とし穴(LINE編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131121/519675/?ST=security
欧州委、米欧間の信頼回復に努めるよう米当局に呼びかけ
http://itpro.nikkeibp.co.jp/article/NEWS/20131128/521247/?ST=security
世界のセキュリティ・ラボから
Android 4.4をセキュリティの観点から考察
http://itpro.nikkeibp.co.jp/article/COLUMN/20131125/520506/?ST=security
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.53
+ Cisco IOS XR SNMP Memory Leak Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6700
+ Cisco IOS XE MPLS Processing Flaw Let Remote Users Deny Service
http://www.securitytracker.com/id/1029407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6706
+ Windows NDPROXY Driver Flaw Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
Linux Kernel Buffer Overflow in qeth_snmp_command() Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
+ REMOTE: MS13-090 CardSpaceClaimCollection ActiveX Integer Underflow
http://www.exploit-db.com/exploits/29857
+ REMOTE: MS12-022 Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
http://www.exploit-db.com/exploits/29858
+ REMOTE: Apache Roller OGNL Injection
http://www.exploit-db.com/exploits/29859
+ LOCAL: Adobe Acrobat Reader ASLR/DEP Bypass Exploit with SANDBOX BYPASS
http://www.exploit-db.com/exploits/29881
+ SA55809 Microsoft Windows NDProxy.sys Privilege Escalation Vulnerability
http://secunia.com/advisories/55809/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5065
+ AndroidOS 4.3 / com.android.settings Permission Bypass
http://cxsecurity.com/issue/WLB-2013110204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6271
+ Adobe Acrobat Reader ASLR/DEP Bypass Exploit with SANDBOX BYPASS
http://cxsecurity.com/issue/WLB-2013110202
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0640
+ Microsoft Tagged Image File Format (TIFF) Integer Overflow
http://cxsecurity.com/issue/WLB-2013110199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3906
+ Linux Kernel CVE-2013-6405 Memory Leak Multiple Local Information Disclosure Vulnerabilities
http://www.securityfocus.com/bid/63999
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405
2014年問題はコーポレートのリスク、経営トップは覚悟を
ラック 取締役最高技術責任者 西本逸郎氏
http://itpro.nikkeibp.co.jp/article/Interview/20131125/520483/?ST=security
パスワードはゲームに例えて理解する
http://itpro.nikkeibp.co.jp/article/COLUMN/20131126/520722/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[5]見知らぬ「友だち」が勝手に増殖してしまうという落とし穴(LINE編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131121/519675/?ST=security
欧州委、米欧間の信頼回復に努めるよう米当局に呼びかけ
http://itpro.nikkeibp.co.jp/article/NEWS/20131128/521247/?ST=security
世界のセキュリティ・ラボから
Android 4.4をセキュリティの観点から考察
http://itpro.nikkeibp.co.jp/article/COLUMN/20131125/520506/?ST=security
2013年11月28日木曜日
28日 木曜日、大安
+ RHSA-2013:1764 Critical: ruby security update
http://rhn.redhat.com/errata/RHSA-2013-1764.html
+ HPSBGN02942 rev.1 - HP Service Manager and ServiceCenter, Remote Code Execution
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04026812-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4844
+ Subversion mod_dontdothat Path Validation Flaw Lets Remote Users Bypass Security Restrictions
http://www.securitytracker.com/id/1029402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
+ Juniper Junos Proxy ARP Bug Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
http://www.securitytracker.com/id/1029399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6014
+ Fujitsu Interstage Buffer Overflow in HTTP Server Log System Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1029398
+ Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
http://cxsecurity.com/issue/WLB-2013110184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0074
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3896
+ SA55855 Apache Subversion mod_dontdothat Path Matching Security Bypass Security Issue
http://secunia.com/advisories/55855/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
+ SA55642 Linux Kernel "qeth_snmp_command()" Privilege Escalation Vulnerability
http://secunia.com/advisories/55642/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
Advisory: Endpoint support for Windows 2000 and IA-64 Itanium
http://www.sophos.com/en-us/support/knowledgebase/119894.aspx
Advisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
http://www.sophos.com/en-us/support/knowledgebase/119957.aspx
標的型攻撃にフル機能で対抗、メール/WebゲートウエイとDLPを統合
米Websense(ウェブセンス)
アジア太平洋地域担当バイスプレジデント
Alison Higgins-Miller(アリソン・ヒギンズ・ミラー)氏
http://itpro.nikkeibp.co.jp/article/Interview/20131126/520709/?ST=security
日本を守る「七人の侍」
システム保護は顧客の理解から、セキュリティの伝道師(エバンジェリスト)
NTTデータ先端技術 セキュリティ事業部 辻 伸弘 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518337/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[4]何気ない「つぶやき」で居場所や個人情報を拡散するという落とし穴(Twitter編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131121/519674/?ST=security
「クラウド時代には新しい暗号技術が必要」---DESを破った三菱電機の松井氏
http://itpro.nikkeibp.co.jp/article/NEWS/20131127/521082/?ST=security
チェックしておきたい脆弱性情報<2013.11.27>
http://itpro.nikkeibp.co.jp/article/COLUMN/20131125/520504/?ST=security
多発するサイバー攻撃の裏に組織犯、企業連携で根っこを絶つ取り組みを
ラック 取締役CTO 西本 逸郎氏
http://itpro.nikkeibp.co.jp/article/Interview/20131016/511502/?ST=security
日本を守る「七人の侍」日経コンピュータ
緊急コールで駆けつける、頼れる事故対応者(インシデントハンドラー)
ラック セキュリティ事業本部 サイバー救急センター 犯罪調査グループ GL 関 宏介 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518336/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[3]「体調不良」で仕事をパスしたのが知らないうちにバレてしまうという落とし穴(Facebook編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131121/519672/?ST=security
http://rhn.redhat.com/errata/RHSA-2013-1764.html
+ HPSBGN02942 rev.1 - HP Service Manager and ServiceCenter, Remote Code Execution
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04026812-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4844
+ Subversion mod_dontdothat Path Validation Flaw Lets Remote Users Bypass Security Restrictions
http://www.securitytracker.com/id/1029402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
+ Juniper Junos Proxy ARP Bug Lets Remote Users Deny Service and Obtain Potentially Sensitive Information
http://www.securitytracker.com/id/1029399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6014
+ Fujitsu Interstage Buffer Overflow in HTTP Server Log System Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1029398
+ Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access
http://cxsecurity.com/issue/WLB-2013110184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0074
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3896
+ SA55855 Apache Subversion mod_dontdothat Path Matching Security Bypass Security Issue
http://secunia.com/advisories/55855/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
+ SA55642 Linux Kernel "qeth_snmp_command()" Privilege Escalation Vulnerability
http://secunia.com/advisories/55642/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
Advisory: Endpoint support for Windows 2000 and IA-64 Itanium
http://www.sophos.com/en-us/support/knowledgebase/119894.aspx
Advisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
http://www.sophos.com/en-us/support/knowledgebase/119957.aspx
標的型攻撃にフル機能で対抗、メール/WebゲートウエイとDLPを統合
米Websense(ウェブセンス)
アジア太平洋地域担当バイスプレジデント
Alison Higgins-Miller(アリソン・ヒギンズ・ミラー)氏
http://itpro.nikkeibp.co.jp/article/Interview/20131126/520709/?ST=security
日本を守る「七人の侍」
システム保護は顧客の理解から、セキュリティの伝道師(エバンジェリスト)
NTTデータ先端技術 セキュリティ事業部 辻 伸弘 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518337/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[4]何気ない「つぶやき」で居場所や個人情報を拡散するという落とし穴(Twitter編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131121/519674/?ST=security
「クラウド時代には新しい暗号技術が必要」---DESを破った三菱電機の松井氏
http://itpro.nikkeibp.co.jp/article/NEWS/20131127/521082/?ST=security
チェックしておきたい脆弱性情報<2013.11.27>
http://itpro.nikkeibp.co.jp/article/COLUMN/20131125/520504/?ST=security
多発するサイバー攻撃の裏に組織犯、企業連携で根っこを絶つ取り組みを
ラック 取締役CTO 西本 逸郎氏
http://itpro.nikkeibp.co.jp/article/Interview/20131016/511502/?ST=security
日本を守る「七人の侍」日経コンピュータ
緊急コールで駆けつける、頼れる事故対応者(インシデントハンドラー)
ラック セキュリティ事業本部 サイバー救急センター 犯罪調査グループ GL 関 宏介 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518336/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[3]「体調不良」で仕事をパスしたのが知らないうちにバレてしまうという落とし穴(Facebook編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131121/519672/?ST=security
2013年11月26日火曜日
26日 火曜日、先負
+ CESA-2013:X014 Important Xen4CentOS libvirt Security Update
http://lwn.net/Alerts/574886/
+ CESA-2013:X013 Important Xen4CentOS xen Security Update
http://lwn.net/Alerts/574887/
+ Dovecot 2.2.9 released
http://www.dovecot.org/list/dovecot-news/2013-November/000267.html
+ Cisco IOS IPSec ICMP Flaw Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6694
+ Google Gmail IOS Mobile Application - Persistent / Stored XSS
http://cxsecurity.com/issue/WLB-2013110170
+ SA55871 Cisco IOS ICMP Processing IPSec Tunnels Denial of Service Vulnerability
http://secunia.com/advisories/55871/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6694
+ SA55789 Kingsoft KDrive SSL Certificate Verification Security Issue
http://secunia.com/advisories/55789/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5999
+ Linux Kernel 'genlock_dev_ioctl()' Function Memory Leak Local Information Disclosure Vulnerability
http://www.securityfocus.com/bid/63909
+ Linux Kernel 'qeth_core_main.c' File Local Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/63890
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
日本を守る「七人の侍」
海外のサイバー戦を調査研究、陸自のシステム防御に生かす分析官(アナリスト)
防衛省 陸上自衛隊 通信団 システム防護隊 技術隊 防衛技官 猪股 晃匡 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518335/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[2]不正アクセスに遭うと何もできなくなってしまうという落とし穴(Google編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131119/519083/?ST=security
NSAは世界で5万台のマシンにマルウエアをインストール、オランダ紙が報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131125/520385/?ST=security
Twitter、暗号解読を困難にする「Perfect Forward Secrecy」を導入
http://itpro.nikkeibp.co.jp/article/NEWS/20131125/520384/?ST=security
悪質化する攻撃に専門技術者の連携で対抗、ラックがセキュリティ研究組織を強化
「サイバー・グリッド・ジャパン」構想を発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131125/520364/?ST=security
JVNVU#97867247 Thomson Reuters Velocity Analytics Vhayu Analytic Server にコードインジェクションの脆弱性
http://jvn.jp/cert/JVNVU97867247/
REMOTE: DesktopCentral AgentLogUpload Arbitrary File Upload
http://www.exploit-db.com/exploits/29812
REMOTE: NETGEAR ReadyNAS Perl Code Evaluation
http://www.exploit-db.com/exploits/29815
LOCAL: ALLPlayer 5.7 (.m3u) - SEH Buffer Overflow (Unicode)
http://www.exploit-db.com/exploits/29798
http://lwn.net/Alerts/574886/
+ CESA-2013:X013 Important Xen4CentOS xen Security Update
http://lwn.net/Alerts/574887/
+ Dovecot 2.2.9 released
http://www.dovecot.org/list/dovecot-news/2013-November/000267.html
+ Cisco IOS IPSec ICMP Flaw Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6694
+ Google Gmail IOS Mobile Application - Persistent / Stored XSS
http://cxsecurity.com/issue/WLB-2013110170
+ SA55871 Cisco IOS ICMP Processing IPSec Tunnels Denial of Service Vulnerability
http://secunia.com/advisories/55871/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6694
+ SA55789 Kingsoft KDrive SSL Certificate Verification Security Issue
http://secunia.com/advisories/55789/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5999
+ Linux Kernel 'genlock_dev_ioctl()' Function Memory Leak Local Information Disclosure Vulnerability
http://www.securityfocus.com/bid/63909
+ Linux Kernel 'qeth_core_main.c' File Local Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/63890
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381
日本を守る「七人の侍」
海外のサイバー戦を調査研究、陸自のシステム防御に生かす分析官(アナリスト)
防衛省 陸上自衛隊 通信団 システム防護隊 技術隊 防衛技官 猪股 晃匡 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518335/?ST=security
【今さら聞けない! ソーシャルメディアの落とし穴】
[2]不正アクセスに遭うと何もできなくなってしまうという落とし穴(Google編)
http://itpro.nikkeibp.co.jp/article/COLUMN/20131119/519083/?ST=security
NSAは世界で5万台のマシンにマルウエアをインストール、オランダ紙が報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131125/520385/?ST=security
Twitter、暗号解読を困難にする「Perfect Forward Secrecy」を導入
http://itpro.nikkeibp.co.jp/article/NEWS/20131125/520384/?ST=security
悪質化する攻撃に専門技術者の連携で対抗、ラックがセキュリティ研究組織を強化
「サイバー・グリッド・ジャパン」構想を発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131125/520364/?ST=security
JVNVU#97867247 Thomson Reuters Velocity Analytics Vhayu Analytic Server にコードインジェクションの脆弱性
http://jvn.jp/cert/JVNVU97867247/
REMOTE: DesktopCentral AgentLogUpload Arbitrary File Upload
http://www.exploit-db.com/exploits/29812
REMOTE: NETGEAR ReadyNAS Perl Code Evaluation
http://www.exploit-db.com/exploits/29815
LOCAL: ALLPlayer 5.7 (.m3u) - SEH Buffer Overflow (Unicode)
http://www.exploit-db.com/exploits/29798
2013年11月25日月曜日
25日 月曜日、友引
+ Apache HTTP Server 2.4.7 Released
http://www.apache.org/dist/httpd/Announcement2.4.html
+ iptables 1.4.21 released
http://www.hu.netfilter.org/projects/iptables/downloads.html#iptables-1.4.21
+ Samba 4.1.2 Available for Download
http://samba.org/samba/history/samba-4.1.2.html
+ Cisco IOS IPSec MTU Remote Denial of Service Vulnerability
http://www.securityfocus.com/bid/63874
CVE-2013-6694
InterScan Web Security Suite 3.1 Critical Patch 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2039
Replication Bug Warning
http://www.postgresql.org/about/news/1491/
JVNDB-2013-000108 KDrive個人版 PCクライアントソフトにおける SSL サーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000108.html
JVNDB-2013-000110 D-Link DES-3800 シリーズにおけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000110.html
JVNDB-2013-000109 D-Link DES-3800 シリーズにおけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000109.html
最高峰ハッカーコンテスト6位に貢献、脆弱性を突き止める正義の技術者(ホワイトハッカー)
サイバーディフェンス研究所 情報分析部 バイナリアン 丑丸 逸人 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518334/?ST=security
[1]無料サービスで“情報大公開”という落とし穴
http://itpro.nikkeibp.co.jp/article/COLUMN/20131120/519402/?ST=security
マカフィー、電話番号を盗むAndroidチャットアプリを発見
http://itpro.nikkeibp.co.jp/article/NEWS/20131122/520062/?ST=security
UPDATE: JVNTA13-317A Microsoft 製品の複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNTA13-317A/index.html
VU#893462 Thomson Reuters Velocity Analytics Vhayu Analytic Server version 6.9.4 build 2995 contains a code injection vulnerability
http://www.kb.cert.org/vuls/id/893462
LOCAL: ALLPlayer 5.7 (.m3u) - SEH Buffer Overflow (Unicode)
http://www.exploit-db.com/exploits/29798
DoS/PoC: Boilsoft RM TO MP3 Converter 1.72 - Crash POC (.wav)
http://www.exploit-db.com/exploits/29791
http://www.apache.org/dist/httpd/Announcement2.4.html
+ iptables 1.4.21 released
http://www.hu.netfilter.org/projects/iptables/downloads.html#iptables-1.4.21
+ Samba 4.1.2 Available for Download
http://samba.org/samba/history/samba-4.1.2.html
+ Cisco IOS IPSec MTU Remote Denial of Service Vulnerability
http://www.securityfocus.com/bid/63874
CVE-2013-6694
InterScan Web Security Suite 3.1 Critical Patch 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2039
Replication Bug Warning
http://www.postgresql.org/about/news/1491/
JVNDB-2013-000108 KDrive個人版 PCクライアントソフトにおける SSL サーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000108.html
JVNDB-2013-000110 D-Link DES-3800 シリーズにおけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000110.html
JVNDB-2013-000109 D-Link DES-3800 シリーズにおけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000109.html
最高峰ハッカーコンテスト6位に貢献、脆弱性を突き止める正義の技術者(ホワイトハッカー)
サイバーディフェンス研究所 情報分析部 バイナリアン 丑丸 逸人 氏
http://itpro.nikkeibp.co.jp/article/COLUMN/20131115/518334/?ST=security
[1]無料サービスで“情報大公開”という落とし穴
http://itpro.nikkeibp.co.jp/article/COLUMN/20131120/519402/?ST=security
マカフィー、電話番号を盗むAndroidチャットアプリを発見
http://itpro.nikkeibp.co.jp/article/NEWS/20131122/520062/?ST=security
UPDATE: JVNTA13-317A Microsoft 製品の複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNTA13-317A/index.html
VU#893462 Thomson Reuters Velocity Analytics Vhayu Analytic Server version 6.9.4 build 2995 contains a code injection vulnerability
http://www.kb.cert.org/vuls/id/893462
LOCAL: ALLPlayer 5.7 (.m3u) - SEH Buffer Overflow (Unicode)
http://www.exploit-db.com/exploits/29798
DoS/PoC: Boilsoft RM TO MP3 Converter 1.72 - Crash POC (.wav)
http://www.exploit-db.com/exploits/29791
2013年11月22日金曜日
22日 金曜日、大安
+ RHSA-2013:1732 Low: busybox security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1732.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1813
+ RHSA-2013:1553 Important: qemu-kvm security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1553.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344
+ RHSA-2013:1635 Low: pacemaker security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1635.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0281
+ RHSA-2013:1645 Important: Red Hat Enterprise Linux 6 kernel update
http://rhn.redhat.com/errata/RHSA-2013-1645.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6545
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
+ RHSA-2013:1605 Moderate: glibc security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1605.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
+ RHSA-2013:1615 Moderate: php security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1615.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
+ RHSA-2013:1582 Moderate: python security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1582.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238
+ RHSA-2013:1542 Moderate: samba security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1542.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
+ RHSA-2013:1536 Moderate: libguestfs security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1536.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419
+ RHSA-2013:1620 Low: xorg-x11-server security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1620.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
+ RHSA-2013:1569 Moderate: wireshark security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1569.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721
+ RHSA-2013:1591 Low: openssh security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1591.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107
+ RHSA-2013:1537 Low: augeas security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1537.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0787
+ RHSA-2013:1701 Low: sudo security, bug fix and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1701.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777
+ RHSA-2013:1661 Moderate: RDMA stack security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1661.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2561
+ RHSA-2013:1540 Low: evolution security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1540.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4166
+ RHSA-2013:1543 Moderate: samba4 security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1543.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
+ RHSA-2013:1652 Low: coreutils security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1652.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223
+ RHSA-2013:1674 Moderate: dracut security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1674.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4453
+ RHSA-2013:1752 Important: 389-ds-base security update
http://rhn.redhat.com/errata/RHSA-2013-1752.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4485
+ libpng 1.6.7 released
http://www.libpng.org/pub/png/src/libpng-1.6.7-README.txt
+ Linux Kernel IPVS Stack Overflows Let Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588
+ Apple MacOSX 10.9 Hard Link Memory Corruption
http://cxsecurity.com/issue/WLB-2013110059
Advisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
http://www.sophos.com/en-us/support/knowledgebase/119957.aspx
Intelligent Converters released PostgreSQL-to-MSSQL and MSSQL-to-PostgreSQL converters
http://www.postgresql.org/about/news/1490/
賞金総額3000万円のコンテストでモバイル機器の弱点を洗い出す
米ヒューレットパッカード エンタープライズ・セキュリティ・プロダクツ 脆弱性リサーチ部門ゼロデイイニシアティブ(ZDI)マネジャー
ブライアン・ゴーレンス氏
http://itpro.nikkeibp.co.jp/article/Interview/20131120/519427/?ST=security
エアー、eディスカバリーを強化した新版メールアーカイバー「WISE Audit V6.0」を発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131121/519725/?ST=security
国内の企業を狙う標的型攻撃が出現、Officeのゼロデイ脆弱性を悪用
http://itpro.nikkeibp.co.jp/article/NEWS/20131121/519564/?ST=security
http://rhn.redhat.com/errata/RHSA-2013-1732.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1813
+ RHSA-2013:1553 Important: qemu-kvm security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1553.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344
+ RHSA-2013:1635 Low: pacemaker security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1635.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0281
+ RHSA-2013:1645 Important: Red Hat Enterprise Linux 6 kernel update
http://rhn.redhat.com/errata/RHSA-2013-1645.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6545
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
+ RHSA-2013:1605 Moderate: glibc security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1605.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
+ RHSA-2013:1615 Moderate: php security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1615.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
+ RHSA-2013:1582 Moderate: python security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1582.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238
+ RHSA-2013:1542 Moderate: samba security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1542.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
+ RHSA-2013:1536 Moderate: libguestfs security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1536.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419
+ RHSA-2013:1620 Low: xorg-x11-server security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1620.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
+ RHSA-2013:1569 Moderate: wireshark security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1569.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721
+ RHSA-2013:1591 Low: openssh security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1591.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107
+ RHSA-2013:1537 Low: augeas security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1537.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0787
+ RHSA-2013:1701 Low: sudo security, bug fix and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1701.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777
+ RHSA-2013:1661 Moderate: RDMA stack security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1661.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2561
+ RHSA-2013:1540 Low: evolution security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1540.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4166
+ RHSA-2013:1543 Moderate: samba4 security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1543.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
+ RHSA-2013:1652 Low: coreutils security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1652.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223
+ RHSA-2013:1674 Moderate: dracut security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1674.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4453
+ RHSA-2013:1752 Important: 389-ds-base security update
http://rhn.redhat.com/errata/RHSA-2013-1752.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4485
+ libpng 1.6.7 released
http://www.libpng.org/pub/png/src/libpng-1.6.7-README.txt
+ Linux Kernel IPVS Stack Overflows Let Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588
+ Apple MacOSX 10.9 Hard Link Memory Corruption
http://cxsecurity.com/issue/WLB-2013110059
Advisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
http://www.sophos.com/en-us/support/knowledgebase/119957.aspx
Intelligent Converters released PostgreSQL-to-MSSQL and MSSQL-to-PostgreSQL converters
http://www.postgresql.org/about/news/1490/
賞金総額3000万円のコンテストでモバイル機器の弱点を洗い出す
米ヒューレットパッカード エンタープライズ・セキュリティ・プロダクツ 脆弱性リサーチ部門ゼロデイイニシアティブ(ZDI)マネジャー
ブライアン・ゴーレンス氏
http://itpro.nikkeibp.co.jp/article/Interview/20131120/519427/?ST=security
エアー、eディスカバリーを強化した新版メールアーカイバー「WISE Audit V6.0」を発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131121/519725/?ST=security
国内の企業を狙う標的型攻撃が出現、Officeのゼロデイ脆弱性を悪用
http://itpro.nikkeibp.co.jp/article/NEWS/20131121/519564/?ST=security
2013年11月21日木曜日
21日 木曜日、仏滅
+ Linux kernel 3.12.1, 3.11.9, 3.10.20, 3.4.70 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.1
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.9
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.20
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.70
+ Linux Kernel 3.11.7 <= sk_attach_filter Kernel Heap Corruption
http://cxsecurity.com/issue/WLB-2013110144
+ SA55709 Linux Kernel IPVS Two Buffer Overflow Vulnerabilities
http://secunia.com/advisories/55709/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588
+ SA55773 nginx Request URI Verification Security Bypass Security Issue
http://secunia.com/advisories/55773/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
+ SA55757 nginx Request URI Verification Security Bypass Security Issue
http://secunia.com/advisories/55757/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
Zimbra Lends a Helping Hand at DFW Susan G. Komen 3-Day
http://telligent.com/company/news/b/teamblog/archive/2013/11/20/zimbra-lends-a-helping-hand-at-dfw-susan-g-komen-3-day.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1384732880209.1384991910804.15&__hssc=122069652.1.1384991910804&__hsfp=3431610341
JVNDB-2013-000107 EC-CUBE におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000107.html
JVNDB-2013-000106 EC-CUBE における情報漏えいの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000106.html
JVNDB-2013-000098 EC-CUBE における情報漏えいの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000098.html
JVNDB-2013-000097 EC-CUBE におけるクロスサイトリクエストフォージェリの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000097.html
JVNDB-2013-000105 EC-CUBE におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000105.html
JVNDB-2013-000104 EC-CUBE における情報漏えいの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000104.html
欧州がデータ保護規制を強化へ
「忘れられる権利」や巨額の罰金盛り込む
http://itpro.nikkeibp.co.jp/article/COLUMN/20131108/516877/?ST=security
「モバイルのデータは危険にさらされている」---米HPセキュリティリサーチのトップ
http://itpro.nikkeibp.co.jp/article/NEWS/20131120/519371/?ST=security
米大手キャリアは「キルスイッチ」実装に反対---米メディアの報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131120/519186/?ST=security
REMOTE: PineApp MailSecure - Remote Command Execution
http://www.exploit-db.com/exploits/29734
DoS/PoC: DeepOfix SMTP Server 3.3 - Authentication Bypass
http://www.exploit-db.com/exploits/29706
DoS/PoC: JPEGView 1.0.29 - Crash PoC
http://www.exploit-db.com/exploits/29707
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.1
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.9
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.20
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.70
+ Linux Kernel 3.11.7 <= sk_attach_filter Kernel Heap Corruption
http://cxsecurity.com/issue/WLB-2013110144
+ SA55709 Linux Kernel IPVS Two Buffer Overflow Vulnerabilities
http://secunia.com/advisories/55709/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588
+ SA55773 nginx Request URI Verification Security Bypass Security Issue
http://secunia.com/advisories/55773/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
+ SA55757 nginx Request URI Verification Security Bypass Security Issue
http://secunia.com/advisories/55757/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
Zimbra Lends a Helping Hand at DFW Susan G. Komen 3-Day
http://telligent.com/company/news/b/teamblog/archive/2013/11/20/zimbra-lends-a-helping-hand-at-dfw-susan-g-komen-3-day.aspx?__hstc=122069652.2225436ba83b8c1fdfbe1abb5d7957e4.1378771371855.1384732880209.1384991910804.15&__hssc=122069652.1.1384991910804&__hsfp=3431610341
JVNDB-2013-000107 EC-CUBE におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000107.html
JVNDB-2013-000106 EC-CUBE における情報漏えいの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000106.html
JVNDB-2013-000098 EC-CUBE における情報漏えいの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000098.html
JVNDB-2013-000097 EC-CUBE におけるクロスサイトリクエストフォージェリの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000097.html
JVNDB-2013-000105 EC-CUBE におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000105.html
JVNDB-2013-000104 EC-CUBE における情報漏えいの脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000104.html
欧州がデータ保護規制を強化へ
「忘れられる権利」や巨額の罰金盛り込む
http://itpro.nikkeibp.co.jp/article/COLUMN/20131108/516877/?ST=security
「モバイルのデータは危険にさらされている」---米HPセキュリティリサーチのトップ
http://itpro.nikkeibp.co.jp/article/NEWS/20131120/519371/?ST=security
米大手キャリアは「キルスイッチ」実装に反対---米メディアの報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131120/519186/?ST=security
REMOTE: PineApp MailSecure - Remote Command Execution
http://www.exploit-db.com/exploits/29734
DoS/PoC: DeepOfix SMTP Server 3.3 - Authentication Bypass
http://www.exploit-db.com/exploits/29706
DoS/PoC: JPEGView 1.0.29 - Crash PoC
http://www.exploit-db.com/exploits/29707
2013年11月20日水曜日
20日 水曜日、先負
+ Opera 18 released
http://www.opera.com/docs/changelogs/unified/1800/
+ nginx security advisory (CVE-2013-4547)
http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
+ FreeBSD-SA-13:14.openssh: OpenSSH AES-GCM memory corruption vulnerability
http://www.freebsd.org/security/advisories/FreeBSD-SA-13:14.openssh.asc
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
+ Dovecot 2.2.8 released
http://www.dovecot.org/list/dovecot-news/2013-November/000265.html
+ Samba 4.0.12 Available for Download
http://samba.org/samba/history/samba-4.0.12.html
+ nginx URI Parsing Flaw Lets Remote Users Bypass Security Restrictions
http://www.securitytracker.com/id/1029363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
+ Mozilla Firefox Bugs Let Remote Users Deny Service and Bypass Security Restrictions
http://www.securitytracker.com/id/1029359
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
+ Linux kernel nfs missing check for buffer length
http://cxsecurity.com/issue/WLB-2013110137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
+ Linux kernel kvm memory leak (DoS)
http://cxsecurity.com/issue/WLB-2013110136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
+ Apple MacOSX 10.9 Hard Link Memory Corruption
http://cxsecurity.com/issue/WLB-2013110059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6799
+ Facebook Open Redirection
http://cxsecurity.com/issue/WLB-2013110127
+ SA55720: Opera Unspecified Vulnerabilities
http://secunia.com/advisories/55720/
+ OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
http://www.securityfocus.com/bid/63605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
2012年国内DLP市場は43億円、2017年には105億円市場に---IDC Japan調査
http://itpro.nikkeibp.co.jp/article/NEWS/20131119/519042/?ST=security
キヤノンIT、ユーザー数無制限の統合メールセキュリティゲートウエイを出荷
http://itpro.nikkeibp.co.jp/article/NEWS/20131119/519012/?ST=security
Yahoo!、来年3月末までにデータセンター間の全情報を暗号化
http://itpro.nikkeibp.co.jp/article/NEWS/20131119/518857/?ST=security
Google、「Safari」を介したWeb履歴追跡問題で37州と1700万ドルで和解
http://itpro.nikkeibp.co.jp/article/NEWS/20131119/518852/?ST=security
JVNVU#94629327 Adobe ColdFusion に複数の脆弱性
http://jvn.jp/cert/JVNVU94629327/
2013年11月19日火曜日
19日 火曜日、友引
+ MFSA 2013-103 Miscellaneous Network Security Services (NSS) vulnerabilities
http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
+ FreeBSD <= 10 kernel qlxge/qlxgbe Driver IOCTL Multiple Kernel Memory Leak Bugs
http://cxsecurity.com/issue/WLB-2013110118
+ FreeBSD 10 <= nand Driver IOCTL Kernel Memory Leak Bug
http://cxsecurity.com/issue/WLB-2013110117
+ Apple Mac OS X Hard Link Local Denial of Service Vulnerability
http://www.securityfocus.com/bid/63612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6799
+ Linux Kernel '__nfs4_get_acl_uncached()' Function Local Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/63791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
+ Linux Kernel 'kvm_main.c' Local Denial of Service Vulnerability
http://www.securityfocus.com/bid/63790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
SCSK、IPSでパッチを代用するWindows XP保護システムを提供開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131118/518649/?ST=security
Anonymousの新手のサイバーテロか、複合機が勝手に数万枚の印刷物を出力
http://itpro.nikkeibp.co.jp/article/COLUMN/20131118/518594/?ST=security
Facebook、ポリシー改定で批判のあった一部文章を削除
http://itpro.nikkeibp.co.jp/article/NEWS/20131118/518587/?ST=security
Anonymousが約1年にわたって米政府機関に不正アクセス、海外メディアの報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131118/518544/?ST=security
UPDATE: JVNTA13-317A Microsoft 製品の複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNTA13-317A/index.html
VU#295276 Adobe ColdFusion is vulnerable to cross-site scripting with directory traversal via the logviewer directory
http://www.kb.cert.org/vuls/id/295276
REMOTE: Supermicro Onboard IPMI close_window.cgi Buffer Overflow
http://www.exploit-db.com/exploits/29666
DoS/PoC: Avira Secure Backup 1.0.0.1 Build 3616 (.reg) - Buffer Overflow
http://www.exploit-db.com/exploits/29671
http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566
+ FreeBSD <= 10 kernel qlxge/qlxgbe Driver IOCTL Multiple Kernel Memory Leak Bugs
http://cxsecurity.com/issue/WLB-2013110118
+ FreeBSD 10 <= nand Driver IOCTL Kernel Memory Leak Bug
http://cxsecurity.com/issue/WLB-2013110117
+ Apple Mac OS X Hard Link Local Denial of Service Vulnerability
http://www.securityfocus.com/bid/63612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6799
+ Linux Kernel '__nfs4_get_acl_uncached()' Function Local Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/63791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
+ Linux Kernel 'kvm_main.c' Local Denial of Service Vulnerability
http://www.securityfocus.com/bid/63790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
SCSK、IPSでパッチを代用するWindows XP保護システムを提供開始
http://itpro.nikkeibp.co.jp/article/NEWS/20131118/518649/?ST=security
Anonymousの新手のサイバーテロか、複合機が勝手に数万枚の印刷物を出力
http://itpro.nikkeibp.co.jp/article/COLUMN/20131118/518594/?ST=security
Facebook、ポリシー改定で批判のあった一部文章を削除
http://itpro.nikkeibp.co.jp/article/NEWS/20131118/518587/?ST=security
Anonymousが約1年にわたって米政府機関に不正アクセス、海外メディアの報道
http://itpro.nikkeibp.co.jp/article/NEWS/20131118/518544/?ST=security
UPDATE: JVNTA13-317A Microsoft 製品の複数の脆弱性に対するアップデート
http://jvn.jp/cert/JVNTA13-317A/index.html
VU#295276 Adobe ColdFusion is vulnerable to cross-site scripting with directory traversal via the logviewer directory
http://www.kb.cert.org/vuls/id/295276
REMOTE: Supermicro Onboard IPMI close_window.cgi Buffer Overflow
http://www.exploit-db.com/exploits/29666
DoS/PoC: Avira Secure Backup 1.0.0.1 Build 3616 (.reg) - Buffer Overflow
http://www.exploit-db.com/exploits/29671
2013年11月18日月曜日
18日 月曜日、先勝
+ Mozilla Firefox 25.0.1 released
http://www.mozilla.org/en-US/firefox/25.0.1/releasenotes/
+ UPDATE: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip
+ VMSA-2013-0013 VMware Workstation host privilege escalation vulnerability
http://www.vmware.com/security/advisories/VMSA-2013-0013.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5972
+ Apache HTTP Server 2.2.26 Released
http://www.apache.org/dist/httpd/Announcement2.2.html
+ libcurl cert name check ignore
http://curl.haxx.se/docs/adv_20131115.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545
+ PHP 5.4.22 Released
http://php.net/archive/2013.php#id2013-11-14-3
+ OpenLDAP 2.4.38 released
http://www.openldap.org/software/release/changes.html
+ Google Chrome Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1029351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632
+ VMware Workstation and Player Shared Library Flaw Lets Lets Local Users Gain Root Privileges
http://www.securitytracker.com/id/1029350
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5972
+ SA55658 Linux Kernel "udp6_ufo_fragment()" Denial of Service Vulnerability
http://secunia.com/advisories/55658/
+ Linux kernel net ipvs stack buffer overflow
http://cxsecurity.com/issue/WLB-2013110112
+ Android 4.3 Superuser Root Privilege Escalation
http://cxsecurity.com/issue/WLB-2013110107
+ Android 4.2.x Superuser Unsanitized Environment
http://cxsecurity.com/issue/WLB-2013110106
+ Android 4.2.x Superuser Shell Character Escape
http://cxsecurity.com/issue/WLB-2013110105
+ Linux Kernel IP Virtual Server Stack Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/63744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588
JVNDB-2011-003557 ASP.NET におけるオープンリダイレクトの脆弱性
http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-003557.html
世界のセキュリティ・ラボから
企業のほとんどはサイバー攻撃対策が不十分
http://itpro.nikkeibp.co.jp/article/COLUMN/20131114/518184/?ST=security
第8回OWASP Nightを開催、5つのセッションでWebセキュリティの課題を指摘
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518450/?ST=security
Microsoft、サイバー犯罪対策に取り組む「Cybercrime Center」を開設
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518302/?ST=security
情報漏洩の危機にさらされるデジタル複合機
http://itpro.nikkeibp.co.jp/article/COLUMN/20131114/518123/?ST=security
Googleが透明性レポートを更新、米政府のデータ開示要請は3年半で3倍に
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518262/?ST=security
「IEの新しい脆弱性を突く攻撃は、標的型なのに継続的に攻撃しない」、ファイア・アイが説明
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518206/?ST=security
JVNVU#95124340 EMC Documentum にクロスサイトスクリプティングの脆弱性
http://jvn.jp/cert/JVNVU95124340/index.html
http://www.mozilla.org/en-US/firefox/25.0.1/releasenotes/
+ UPDATE: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131106-sip
+ VMSA-2013-0013 VMware Workstation host privilege escalation vulnerability
http://www.vmware.com/security/advisories/VMSA-2013-0013.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5972
+ Apache HTTP Server 2.2.26 Released
http://www.apache.org/dist/httpd/Announcement2.2.html
+ libcurl cert name check ignore
http://curl.haxx.se/docs/adv_20131115.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545
+ PHP 5.4.22 Released
http://php.net/archive/2013.php#id2013-11-14-3
+ OpenLDAP 2.4.38 released
http://www.openldap.org/software/release/changes.html
+ Google Chrome Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1029351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632
+ VMware Workstation and Player Shared Library Flaw Lets Lets Local Users Gain Root Privileges
http://www.securitytracker.com/id/1029350
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5972
+ SA55658 Linux Kernel "udp6_ufo_fragment()" Denial of Service Vulnerability
http://secunia.com/advisories/55658/
+ Linux kernel net ipvs stack buffer overflow
http://cxsecurity.com/issue/WLB-2013110112
+ Android 4.3 Superuser Root Privilege Escalation
http://cxsecurity.com/issue/WLB-2013110107
+ Android 4.2.x Superuser Unsanitized Environment
http://cxsecurity.com/issue/WLB-2013110106
+ Android 4.2.x Superuser Shell Character Escape
http://cxsecurity.com/issue/WLB-2013110105
+ Linux Kernel IP Virtual Server Stack Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/63744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588
JVNDB-2011-003557 ASP.NET におけるオープンリダイレクトの脆弱性
http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-003557.html
世界のセキュリティ・ラボから
企業のほとんどはサイバー攻撃対策が不十分
http://itpro.nikkeibp.co.jp/article/COLUMN/20131114/518184/?ST=security
第8回OWASP Nightを開催、5つのセッションでWebセキュリティの課題を指摘
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518450/?ST=security
Microsoft、サイバー犯罪対策に取り組む「Cybercrime Center」を開設
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518302/?ST=security
情報漏洩の危機にさらされるデジタル複合機
http://itpro.nikkeibp.co.jp/article/COLUMN/20131114/518123/?ST=security
Googleが透明性レポートを更新、米政府のデータ開示要請は3年半で3倍に
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518262/?ST=security
「IEの新しい脆弱性を突く攻撃は、標的型なのに継続的に攻撃しない」、ファイア・アイが説明
http://itpro.nikkeibp.co.jp/article/NEWS/20131115/518206/?ST=security
JVNVU#95124340 EMC Documentum にクロスサイトスクリプティングの脆弱性
http://jvn.jp/cert/JVNVU95124340/index.html
2013年11月15日金曜日
15日 金曜日、仏滅
+ About the security content of iOS 7.0.4
http://support.apple.com/kb/HT6058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5193
+ PHP 5.5.6 is now available
http://php.net/archive/2013.php#id2013-11-14-1
+ Linux kernel net large udp packet over IPv6 over UFO-enabled device with TBF qdisc panic
http://cxsecurity.com/issue/WLB-2013110096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4563
+ Microsoft CryptoAPI / Outlook 2007-2013 Design Bug
http://cxsecurity.com/issue/WLB-2013110092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3905
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3870
+ Apple iOS Lets Local Users Make App Purchases Without Authorization
http://www.securitytracker.com/id/1029346
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5193
+ Samba Lets Local Users Access the SSL Private Key File
http://www.securitytracker.com/id/1029338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
+ Samba VFS Alternate Data Stream File Access Control Flaw Lets Remote Users Bypass Access Controls
http://www.securitytracker.com/id/1029337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
+ Linux Kernel TBF Scheduler UDP Processing Flaw Lets Local Users Deny Service
http://www.securitytracker.com/id/1029336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4563
+ REMOTE: Symantec Altiris DS SQL Injection
http://www.exploit-db.com/exploits/29552
+ SA55677 JustSystems Multiple Products Unspecified Code Execution Vulnerability
http://secunia.com/advisories/55677/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5990
+ Apple iOS CVE-2013-5193 Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/63723
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5193
+ Apple iOS Safari Mobile Web Browser Session Fixation and Security Bypass Vulnerabilities
http://www.securityfocus.com/bid/63724
+ Linux Kernel CVE-2013-4563 Remote Denial of Service Vulnerability
http://www.securityfocus.com/bid/63702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4563
Check Point response to Media Encryption EPM Explorer lockout bypass
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk96589&src=securityAlerts
Trend Micro Security (for Mac) 2.0 Patch 1 (ビルド 1036) の公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2036
独社製エンジンで検出率を向上、キングソフトがInternet Secutiryの新版を公開
http://itpro.nikkeibp.co.jp/article/NEWS/20131114/517992/?ST=security
WindowsやIEなどに危険な脆弱性、悪用した標的型攻撃も出現
http://itpro.nikkeibp.co.jp/article/NEWS/20131113/517856/?ST=security
VU#466876 EMC Documentum Product Suite version 6.7 contains a DOM based cross-site scripting vulnerability
http://www.kb.cert.org/vuls/id/466876
http://support.apple.com/kb/HT6058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5193
+ PHP 5.5.6 is now available
http://php.net/archive/2013.php#id2013-11-14-1
+ Linux kernel net large udp packet over IPv6 over UFO-enabled device with TBF qdisc panic
http://cxsecurity.com/issue/WLB-2013110096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4563
+ Microsoft CryptoAPI / Outlook 2007-2013 Design Bug
http://cxsecurity.com/issue/WLB-2013110092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3905
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3870
+ Apple iOS Lets Local Users Make App Purchases Without Authorization
http://www.securitytracker.com/id/1029346
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5193
+ Samba Lets Local Users Access the SSL Private Key File
http://www.securitytracker.com/id/1029338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
+ Samba VFS Alternate Data Stream File Access Control Flaw Lets Remote Users Bypass Access Controls
http://www.securitytracker.com/id/1029337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
+ Linux Kernel TBF Scheduler UDP Processing Flaw Lets Local Users Deny Service
http://www.securitytracker.com/id/1029336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4563
+ REMOTE: Symantec Altiris DS SQL Injection
http://www.exploit-db.com/exploits/29552
+ SA55677 JustSystems Multiple Products Unspecified Code Execution Vulnerability
http://secunia.com/advisories/55677/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5990
+ Apple iOS CVE-2013-5193 Local Security Bypass Vulnerability
http://www.securityfocus.com/bid/63723
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5193
+ Apple iOS Safari Mobile Web Browser Session Fixation and Security Bypass Vulnerabilities
http://www.securityfocus.com/bid/63724
+ Linux Kernel CVE-2013-4563 Remote Denial of Service Vulnerability
http://www.securityfocus.com/bid/63702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4563
Check Point response to Media Encryption EPM Explorer lockout bypass
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk96589&src=securityAlerts
Trend Micro Security (for Mac) 2.0 Patch 1 (ビルド 1036) の公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2036
独社製エンジンで検出率を向上、キングソフトがInternet Secutiryの新版を公開
http://itpro.nikkeibp.co.jp/article/NEWS/20131114/517992/?ST=security
WindowsやIEなどに危険な脆弱性、悪用した標的型攻撃も出現
http://itpro.nikkeibp.co.jp/article/NEWS/20131113/517856/?ST=security
VU#466876 EMC Documentum Product Suite version 6.7 contains a DOM based cross-site scripting vulnerability
http://www.kb.cert.org/vuls/id/466876
2013年11月13日水曜日
13日 水曜日、友引
+ 2013 年 11 月のセキュリティ情報
http://technet.microsoft.com/ja-jp/security/bulletin/ms13-nov
+ MS13-088 - 緊急 Internet Explorer 用の累積的なセキュリティ更新プログラム (2888505)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3908
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3909
+ MS13-089 - 緊急 Windows Graphics Device Interface の脆弱性により、リモートでコードが実行される (2876331)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3940
+ MS13-090 - 緊急 ActiveX の Kill Bit の累積的なセキュリティ更新プログラム (2900986)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3918
+ MS13-091 - 重要 Microsoft Office の脆弱性により、リモートでコードが実行される (2885093)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1324
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1325
+ MS13-092 - 重要 Hyper-V の脆弱性により、特権が昇格される (2893986)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3898
+ MS13-093 - 重要 Windows Ancillary Function ドライバーの脆弱性により、情報漏えいが起こる (2875783)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3887
+ MS13-094 - 重要 Microsoft Outlook の脆弱性により、情報漏えいが起こる (2894514)
http://technet.microsoft.com/ja-jp/security/bulletin/ms13-094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3905
+ MS13-095 - 重要 デジタル署名の脆弱性により、サービス拒否が起こる (2868626)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3869
+ Google Chrome 31.0.1650.48 released
http://googlechromereleases.blogspot.jp/2013/11/stable-channel-update.html
+ APSB13-27 Security update: Hotfix available for ColdFusion
http://www.adobe.com/support/security/bulletins/apsb13-27.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5328
+ APSB13-26 Security updates available for Adobe Flash Player
http://www.adobe.com/support/security/bulletins/apsb13-26.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5329
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5330
+ HPSBHF02939 rev.1 - HP Integrated Lights-Out 4 (iLO4), Remote Cross Site Scripting (XSS), Unauthorized Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03996804-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: Microsoft Security Advisory (2896666) Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution
http://technet.microsoft.com/en-us/security/advisory/2896666
+ Microsoft Security Advisory (2880823) Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program
http://technet.microsoft.com/en-us/security/advisory/2880823
+ Microsoft Security Advisory (2868725) Update for Disabling RC4
http://technet.microsoft.com/en-us/security/advisory/2868725
+ Microsoft Security Advisory (2862152) Vulnerability in DirectAccess Could Allow Security Feature Bypass
http://technet.microsoft.com/en-us/security/advisory/2862152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3876
+ Microsoft Security Advisory (2854544) Updates to Improve Cryptography and Digital Certificate Handling in Windows
http://technet.microsoft.com/en-us/security/advisory/2854544
+ マイクロソフト セキュリティ アドバイザリ (2880823) マイクロソフト ルート証明書プログラムでの SHA-1 ハッシュ アルゴリズムの廃止
http://technet.microsoft.com/ja-jp/security/advisory/2880823
+ マイクロソフト セキュリティ アドバイザリ (2868725) RC4 を無効化するための更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2868725
+ マイクロソフト セキュリティ アドバイザリ (2862152) DirectAccess の脆弱性により、セキュリティ機能のバイパスが起こる
http://technet.microsoft.com/ja-jp/security/advisory/2862152
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2854544) Windows の暗号化とデジタル証明書の処理を改善するための更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2854544
+ マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2755801
+ IBM Lotus Sametime WebPlayer Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029315
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3986
+ SA55592 Cisco ASA Software IPv6 NAT Implementation Denial of Service Vulnerability
http://secunia.com/advisories/55592/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5560
+ SA55317 Symantec Workspace Streaming EJBInvokerServlet / JMXInvokerServlet Marshalled Object Vulnerability
http://secunia.com/advisories/55317/
[更新]ウイルス検索エンジン VSAPI 9.750 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2006
JVNDB-2013-000103 一太郎シリーズにおいて任意のコードが実行される脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000103.html
加藤電機、iPhone専用防犯アプリを発売
http://itpro.nikkeibp.co.jp/article/NEWS/20131113/517663/?ST=security
スマホをトイレに置き忘れた結果
http://itpro.nikkeibp.co.jp/article/Watcher/20131111/517112/?ST=security
NEC、パーソナルデータの匿名化処理を高速に実行できるアルゴリズムを開発
http://itpro.nikkeibp.co.jp/article/NEWS/20131112/517404/?ST=security
来るべき「サイバー社会」、2020年に目指す発想の転換と文化の構築
http://itpro.nikkeibp.co.jp/article/COLUMN/20131105/516062/?ST=security
LOCAL: VideoSpirit Pro 1.90 - (SEH) Buffer Overflow
http://www.exploit-db.com/exploits/29547/
LOCAL: VideoSpirit Lite 1.77 - (SEH) Buffer Overflow
http://www.exploit-db.com/exploits/29548
LOCAL: ALLPlayer 5.6.2 (.m3u) - Local Buffer Overflow (SEH/Unicode)
http://www.exploit-db.com/exploits/29549
DoS/PoC: Hanso Converter 2.4.0 - 'ogg' Buffer Overflow(DoS)
http://www.exploit-db.com/exploits/29545
DoS/PoC: Provj 5.1.5.8 - 'm3u' Buffer Overflow (PoC)
http://www.exploit-db.com/exploits/29546
http://technet.microsoft.com/ja-jp/security/bulletin/ms13-nov
+ MS13-088 - 緊急 Internet Explorer 用の累積的なセキュリティ更新プログラム (2888505)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3908
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3909
+ MS13-089 - 緊急 Windows Graphics Device Interface の脆弱性により、リモートでコードが実行される (2876331)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3940
+ MS13-090 - 緊急 ActiveX の Kill Bit の累積的なセキュリティ更新プログラム (2900986)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3918
+ MS13-091 - 重要 Microsoft Office の脆弱性により、リモートでコードが実行される (2885093)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1324
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1325
+ MS13-092 - 重要 Hyper-V の脆弱性により、特権が昇格される (2893986)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3898
+ MS13-093 - 重要 Windows Ancillary Function ドライバーの脆弱性により、情報漏えいが起こる (2875783)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3887
+ MS13-094 - 重要 Microsoft Outlook の脆弱性により、情報漏えいが起こる (2894514)
http://technet.microsoft.com/ja-jp/security/bulletin/ms13-094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3905
+ MS13-095 - 重要 デジタル署名の脆弱性により、サービス拒否が起こる (2868626)
https://technet.microsoft.com/ja-jp/security/bulletin/ms13-095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3869
+ Google Chrome 31.0.1650.48 released
http://googlechromereleases.blogspot.jp/2013/11/stable-channel-update.html
+ APSB13-27 Security update: Hotfix available for ColdFusion
http://www.adobe.com/support/security/bulletins/apsb13-27.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5328
+ APSB13-26 Security updates available for Adobe Flash Player
http://www.adobe.com/support/security/bulletins/apsb13-26.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5329
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5330
+ HPSBHF02939 rev.1 - HP Integrated Lights-Out 4 (iLO4), Remote Cross Site Scripting (XSS), Unauthorized Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03996804-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: Microsoft Security Advisory (2896666) Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution
http://technet.microsoft.com/en-us/security/advisory/2896666
+ Microsoft Security Advisory (2880823) Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program
http://technet.microsoft.com/en-us/security/advisory/2880823
+ Microsoft Security Advisory (2868725) Update for Disabling RC4
http://technet.microsoft.com/en-us/security/advisory/2868725
+ Microsoft Security Advisory (2862152) Vulnerability in DirectAccess Could Allow Security Feature Bypass
http://technet.microsoft.com/en-us/security/advisory/2862152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3876
+ Microsoft Security Advisory (2854544) Updates to Improve Cryptography and Digital Certificate Handling in Windows
http://technet.microsoft.com/en-us/security/advisory/2854544
+ マイクロソフト セキュリティ アドバイザリ (2880823) マイクロソフト ルート証明書プログラムでの SHA-1 ハッシュ アルゴリズムの廃止
http://technet.microsoft.com/ja-jp/security/advisory/2880823
+ マイクロソフト セキュリティ アドバイザリ (2868725) RC4 を無効化するための更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2868725
+ マイクロソフト セキュリティ アドバイザリ (2862152) DirectAccess の脆弱性により、セキュリティ機能のバイパスが起こる
http://technet.microsoft.com/ja-jp/security/advisory/2862152
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2854544) Windows の暗号化とデジタル証明書の処理を改善するための更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2854544
+ マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
http://technet.microsoft.com/ja-jp/security/advisory/2755801
+ IBM Lotus Sametime WebPlayer Lets Remote Users Deny Service
http://www.securitytracker.com/id/1029315
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3986
+ SA55592 Cisco ASA Software IPv6 NAT Implementation Denial of Service Vulnerability
http://secunia.com/advisories/55592/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5560
+ SA55317 Symantec Workspace Streaming EJBInvokerServlet / JMXInvokerServlet Marshalled Object Vulnerability
http://secunia.com/advisories/55317/
[更新]ウイルス検索エンジン VSAPI 9.750 公開のお知らせ
http://www.trendmicro.co.jp/support/news.asp?id=2006
JVNDB-2013-000103 一太郎シリーズにおいて任意のコードが実行される脆弱性
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000103.html
加藤電機、iPhone専用防犯アプリを発売
http://itpro.nikkeibp.co.jp/article/NEWS/20131113/517663/?ST=security
スマホをトイレに置き忘れた結果
http://itpro.nikkeibp.co.jp/article/Watcher/20131111/517112/?ST=security
NEC、パーソナルデータの匿名化処理を高速に実行できるアルゴリズムを開発
http://itpro.nikkeibp.co.jp/article/NEWS/20131112/517404/?ST=security
来るべき「サイバー社会」、2020年に目指す発想の転換と文化の構築
http://itpro.nikkeibp.co.jp/article/COLUMN/20131105/516062/?ST=security
LOCAL: VideoSpirit Pro 1.90 - (SEH) Buffer Overflow
http://www.exploit-db.com/exploits/29547/
LOCAL: VideoSpirit Lite 1.77 - (SEH) Buffer Overflow
http://www.exploit-db.com/exploits/29548
LOCAL: ALLPlayer 5.6.2 (.m3u) - Local Buffer Overflow (SEH/Unicode)
http://www.exploit-db.com/exploits/29549
DoS/PoC: Hanso Converter 2.4.0 - 'ogg' Buffer Overflow(DoS)
http://www.exploit-db.com/exploits/29545
DoS/PoC: Provj 5.1.5.8 - 'm3u' Buffer Overflow (PoC)
http://www.exploit-db.com/exploits/29546
登録:
投稿 (Atom)