2013年7月3日水曜日

3日 水曜日、大安










+ Opera 15.00 released
http://www.opera.com/docs/changelogs/unified/1500/

+ squid 3.3.6 released
http://www.squid-cache.org/Versions/v3/3.3/RELEASENOTES.html

+ UPDATE: Cisco Prime Network Control Systems Database Default Credentials Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-ncs

+ HPSBUX02893 rev.1 - HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Cross Site Scripting (XSS)
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03820647-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken

+ HPSBUX02889 SSRT101252 rev.1 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03809278-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken

+ CVE-2012-5526 Configuration vulnerability in Perl
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5526_configuration_vulnerability
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5526

+ CVE-2012-6329 Code Injection vulnerability in Perl 5.8
https://blogs.oracle.com/sunsecurity/entry/cve_2012_6329_code_injection1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329

+ CVE-2011-0465 Improper Input Validation vulnerability in X.Org
https://blogs.oracle.com/sunsecurity/entry/cve_2011_0465_improper_input
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465

+ CVE-2012-5134 Buffer Overflow vulnerability in libxml2
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5134_buffer_overflow
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134

+ Multiple Input Validation vulnerabilities in kerberos
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4151

+ Samba 4.0.7 Available for Download
http://samba.org/samba/history/samba-4.0.7.html

+ Apple OS X QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1028723
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1019
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1022

+ Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation Metasploit
http://cxsecurity.com/issue/WLB-2013070020

+ Windows 8 to NT EPATHOBJ Local Ring 0 Exploit
http://cxsecurity.com/issue/WLB-2013060019

Advisory: Sophos Anti-Virus for UNIX - Process memory limit recommendations on AIX systems
http://www.sophos.com/en-us/support/knowledgebase/118805.aspx

モバイルデバイスからの情報漏えいと戦う「安全な暗号化」
第3回 情報価値で4段階に分類、漏えい対策にメリハリを
http://itpro.nikkeibp.co.jp/article/COLUMN/20130625/487538/?ST=security

最新サイバー攻撃に備える
大規模化するDDoS攻撃
http://itpro.nikkeibp.co.jp/article/COLUMN/20130628/488536/?ST=security

相次ぐWeb改ざん、原因はまたもや“Gumblar”か
http://itpro.nikkeibp.co.jp/article/NEWS/20130702/488823/?ST=security

LOCAL: Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
http://www.exploit-db.com/exploits/26554

DoS/PoC: WinAmp 5.63 - Invalid Pointer Dereference
http://www.exploit-db.com/exploits/26557

DoS/PoC: WinAmp 5.63 - Stack-based Buffer Overflow
http://www.exploit-db.com/exploits/26558

0 件のコメント:

コメントを投稿