2013年3月26日火曜日

26日 火曜日、仏滅


+ HPSBPV02855 SSRT100512 rev.1 - HP ProCurve 1700-8(J9079A) and 1700-24(J9080A) Switches, Cross Site Request Forgery (CSRF)
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03699981-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5216

+ HPSBUX02857 SSRT101103 rev.1 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03714148-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1541
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3213
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0409
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0423
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0437
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0446
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493

+ RHSA-2013:0683 Moderate: axis security update
http://rhn.redhat.com/errata/RHSA-2013-0683.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784

+ Linux Kernel before 3.8.4 signal always clear sa_restorer on exehttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE
http://cxsecurity.com/issue/WLB-2013030218

+ Linux Kernel before 3.5.7 xfrm_user NULL Pointer
http://cxsecurity.com/issue/WLB-2013030219

+ SA52708 Apache mod_ruid2 chroot Security Bypass Security Issue
http://secunia.com/advisories/52708/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1889

+ mod_ruid2 'chroot()' Function Security Vulnerability
http://www.securityfocus.com/bid/58647

+ Linux Kernel KVM 'MSR_KVM_SYSTEM_TIME' Use After Free Memory Corruption Vulnerability
http://www.securityfocus.com/bid/58605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797

+ Linux Kernel KVM http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798 Denial of Service Vulnerability
http://www.securityfocus.com/bid/58604
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1798

プレス発表
"セキュアな自動車"に向けて「自動車の情報セキュリティへの取組みガイド」等を公開
~企画段階から廃棄段階まで、自動車セキュリティを検討すべき15個のポイント~
http://www.ipa.go.jp/about/press/20130325_2.html

プレス発表
組織における内部不正防止ガイドラインを公開
~内部不正対策に悩んでいる組織のためのガイドラインを公開~
http://www.ipa.go.jp/about/press/20130325.html

セキュリティ・ホットトピックス
韓国大規模サイバー攻撃に学ぶ今後の教訓
http://itpro.nikkeibp.co.jp/article/COLUMN/20130325/465912/?ST=security

クラウド時代のデータ防衛術
[心配-1]いつも同じような広告が…私の履歴を誰かが見ている?
http://itpro.nikkeibp.co.jp/article/COLUMN/20130311/462465/?ST=security

記者の眼
“滝”のようなサイバー攻撃を社長に見せられる、警告システム「DAEDALUS」
http://itpro.nikkeibp.co.jp/article/Watcher/20130315/463731/?ST=security

標的型攻撃の現状と対策
第2回 4段階で進む標的型攻撃
http://itpro.nikkeibp.co.jp/article/COLUMN/20130321/464729/?ST=security

「何度押しても消えませんよ」、Twitter上でブラウザー破壊リンクが出回る
http://itpro.nikkeibp.co.jp/article/NEWS/20130325/465701/?ST=security

富士通SSL、標的型攻撃のなりすましメールを判断/警告するソフトを発表
http://itpro.nikkeibp.co.jp/article/NEWS/20130325/465665/?ST=security

REMOTE: Mitsubishi MX ActiveX Component v3 (ActUWzd.dll (WzTitle)) - Remote Exploit
http://www.exploit-db.com/exploits/24886

REMOTE: KingView Log File Parsing Buffer Overflow
http://www.exploit-db.com/exploits/24887

REMOTE: Mutiny Remote Command Execution
http://www.exploit-db.com/exploits/24888

LOCAL: LiquidXML Studio 2012 ActiveX Insecure Method Executable File Creation 0-day
http://www.exploit-db.com/exploits/24884

LOCAL: LiquidXML Studio 2010 ActiveX Remote 0-day
http://www.exploit-db.com/exploits/24885

DoS/PoC: IconCool MP3 WAV Converter 3.00 Build 120518 - Stack Buffer Overflow Vulnerability
http://www.exploit-db.com/exploits/24880

0 件のコメント:

コメントを投稿