2014年8月4日月曜日

4日 月曜日、先負










+ CESA-2014:0981 Important CentOS 6 kernel Update
http://lwn.net/Alerts/607434/

+ UPDATE: OSPF LSA Manipulation Vulnerability in Multiple Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf

+ HPSBMU03083 rev.1 - HP BladeSystem c-Class Virtual Connect Firmware running OpenSSL, Remote Unauthorized Access or Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04392919-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224

+ Linux kernel 3.12.26 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.26

+ Samba 4.1.11 and 4.0.21 Security Releases Available for Download
http://www.samba.org/samba/history/samba-4.1.11.html
http://www.samba.org/samba/history/samba-4.0.21.html

+ Samba Heap Overflow in nmbd NetBIOS Name Services Daemon Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1030663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560

+ Wireshark Catapult DCT2000/IrDA/GTP/GSM/RLC/ASN.1 BER Dissector Bugs Let Remote Users Deny Service+ Wireshark Catapult DCT2000/IrDA/GTP/GSM/RLC/ASN.1 BER Dissector Bugs Let Remote Users Deny Service
http://www.securitytracker.com/id/1030662
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165

+ Oracle Solaris Multiple Packages Multiple Vulnerabilities
http://secunia.com/advisories/59237/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4320
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2751
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0179
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0346
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1969
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2765
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4885
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4956
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1947
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1958
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2030
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2828
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2907

+ SA59299 Wireshark Multiple Denial of Service Vulnerabilities
http://secunia.com/advisories/59299/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165

+ Linux Kernel 3.15.7 fs/namei.c memory consumption and use-after-free
http://cxsecurity.com/issue/WLB-2014080007
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045

JVNDB-2014-000091 ServerView Operations Manager におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000091.html

電子証明書を盗むウイルスに注意、法人狙った不正送金が急増
http://itpro.nikkeibp.co.jp/atcl/news/14/080100328/?ST=security

米地裁、Microsoftに国外保存の電子メールデータの提出を命令
http://itpro.nikkeibp.co.jp/atcl/news/14/080100319/?ST=security

0 件のコメント:

コメントを投稿