+ Linux kernel 3.4.104 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.104
+ VU#252743 GNU Bash shell executes commands in environment variables
http://www.kb.cert.org/vuls/id/252743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
+ GNU bash Environment Variable Processing Flaw Lets Users Execute Arbitrary Code
http://www.securitytracker.com/id/1030890
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ REMOTE: GNU bash Environment Variable Command Injection
http://www.exploit-db.com/exploits/34765
+ REMOTE: Bash Environment Variables Code Injection Exploit
http://www.exploit-db.com/exploits/34766
+ REMOTE: GNU bash Environment Variable Command Injection (MSF)
http://www.exploit-db.com/exploits/34777
+ CGI Remote Code Injection by Bash Proof Of Concept
http://cxsecurity.com/issue/WLB-2014090129
+ SA61541 GNU Bash Shell Function Definitions OS Commands Injection Vulnerability
http://secunia.com/advisories/61541/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
JVNDB-2014-000116 Yahoo!ボックス(Android版) における SSL サーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000116.html
JVNDB-2014-000108 iOS 版 jigbrowser+ における同一生成元ポリシー回避の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000108.html
JVNDB-2014-000107 エスリンク製 Android アプリ「ファイルマネージャー」におけるディレクトリトラバーサルの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000107.html
JVNDB-2014-000112 WordPress 用プラグイン N-Media file uploader におけるアップロードされたファイルの取扱いに関する脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000112.html
JVNDB-2014-004316 Safari におけるアプリケーションキャッシュの取扱いに関する問題
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004316.html
JVNVU#94190107 Mozilla Network Security Services (NSS) に RSA 署名検証不備の脆弱性
http://jvn.jp/vu/JVNVU94190107/
【Apple IDの「困った!」にお答えします】
【第4回】セキュリティについてきちんと理解しよう
http://itpro.nikkeibp.co.jp/atcl/column/14/091800071/091800004/?ST=security
マトリクス認証のSECUREMATRIXに物理アプライアンスが登場
http://itpro.nikkeibp.co.jp/atcl/news/14/092501069/?ST=security
ベネッセHD、情報漏洩の事故調査委報告書を公開
http://itpro.nikkeibp.co.jp/atcl/news/14/092501068/?ST=security
アシスト、個人情報の漏洩検知でログ分析システムの構築サービス
http://itpro.nikkeibp.co.jp/atcl/news/14/092501066/?ST=security
2014年9月26日金曜日
2014年9月25日木曜日
25日 木曜日、仏滅
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/2755801
+ RHSA-2014:1293 Critical: bash security update
https://rhn.redhat.com/errata/RHSA-2014-1293.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ RHSA-2014:1293 Critical: bash security update
https://access.redhat.com/errata/RHSA-2014:1293
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ RHSA-2014:1292 Moderate: haproxy security update
https://access.redhat.com/errata/RHSA-2014:1292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6269
+ Mozilla Firefox 32.0.3 released
https://www.mozilla.org/en-US/firefox/32.0.3/releasenotes/
+ Mozilla Thunderbird 31.1.2 released
https://www.mozilla.org/en-US/thunderbird/31.1.2/releasenotes/
+ MFSA 2014-73 RSA Signature Forgery in NSS
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ CESA-2014:1293 Critical CentOS 7 bash Security Update
http://lwn.net/Alerts/612980/
+ CESA-2014:1293 Critical CentOS 6 bash Security Update
http://lwn.net/Alerts/612981/
+ CESA-2014:1293 Critical CentOS 5 bash Security Update
http://lwn.net/Alerts/612979/
+ CESA-2014:1292 Moderate CentOS 7 haproxy Security Update
http://lwn.net/Alerts/612982/
+ Cisco IOS Software Network Address Translation Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3361
+ Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3360
+ Multiple Vulnerabilities in Cisco IOS Software Multicast Domain Name System
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3357
+ Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-dhcpv6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3359
+ Cisco IOS Software Metadata Vulnerabilities
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3355
+ Cisco IOS Software RSVP Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3354
+ UPDATE: HPSBMU03086 rev.3 - HP Operations Agent for Linux including Glance, Local Elevation of Privilege
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04394554-3%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: HPSBMU03094 rev.2 - HP Connect-IT, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04401666-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04451722-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ UPDATE: HPSBST03000 rev.5 - HP StoreEver ESL G3 Tape Library and Enterprise Library LTO-6 Tape Drives running OpenSSL, Remote Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-5%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ HPSBST03103 rev.1 - HP Storage EVA Command View Suite running OpenSSL, Remote Unauthorized Access, Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04425253-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ MySQL 5.7.5 released
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-5.html
+ VU#772676 Mozilla Network Security Services (NSS) fails to properly verify RSA signatures
http://www.kb.cert.org/vuls/id/772676
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ Network Security Services (NSS) ASN.1 Parsing Flaw Lets Remote Users Forge Certificates
http://www.securitytracker.com/id/1030899
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ SA61323 Yokogawa CENTUM Series / Exaopc Batch Management File Disclosure and Manipulation Vulnerability
http://secunia.com/advisories/61323/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5208
+ GNU Bash CVE-2014-6271 Remote Code Execution Vulnerability
http://www.securityfocus.com/bid/70103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ Mozilla Network Security Services CVE-2014-1568 Security Bypass Vulnerability
http://www.securityfocus.com/bid/70116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ Linux Kernel CVE-2014-3631 Local Denial of Service Vulnerability
http://www.securityfocus.com/bid/70095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3631
緊急地震速報を装った迷惑メールが出回る、気象庁が注意を呼びかけ
http://itpro.nikkeibp.co.jp/atcl/news/14/092501055/?ST=security
【Apple IDの「困った!」にお答えします】
【第3回】Apple IDをもっと便利に、賢く使うワザ
http://itpro.nikkeibp.co.jp/atcl/column/14/091800071/091800003/?ST=security
JVNVU#96848844 FortiGate および FortiWiFi アプライアンスに複数の脆弱性
http://jvn.jp/vu/JVNVU96848844/
UPDATE: JVNVU#93614707 OpenSSL クライアントにナルポインタ参照の脆弱性
http://jvn.jp/vu/JVNVU93614707/index.html
REMOTE: EMC AlphaStor Device Manager Opcode 0x75 Command Injection
http://www.exploit-db.com/exploits/34756
REMOTE: Advantech WebAccess dvs.ocx GetColor Buffer Overflow
http://www.exploit-db.com/exploits/34757
DoS/PoC: WS10 Data Server SCADA Exploit Overflow PoC
http://www.exploit-db.com/exploits/34752
https://technet.microsoft.com/ja-jp/library/security/2755801
+ RHSA-2014:1293 Critical: bash security update
https://rhn.redhat.com/errata/RHSA-2014-1293.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ RHSA-2014:1293 Critical: bash security update
https://access.redhat.com/errata/RHSA-2014:1293
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ RHSA-2014:1292 Moderate: haproxy security update
https://access.redhat.com/errata/RHSA-2014:1292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6269
+ Mozilla Firefox 32.0.3 released
https://www.mozilla.org/en-US/firefox/32.0.3/releasenotes/
+ Mozilla Thunderbird 31.1.2 released
https://www.mozilla.org/en-US/thunderbird/31.1.2/releasenotes/
+ MFSA 2014-73 RSA Signature Forgery in NSS
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ CESA-2014:1293 Critical CentOS 7 bash Security Update
http://lwn.net/Alerts/612980/
+ CESA-2014:1293 Critical CentOS 6 bash Security Update
http://lwn.net/Alerts/612981/
+ CESA-2014:1293 Critical CentOS 5 bash Security Update
http://lwn.net/Alerts/612979/
+ CESA-2014:1292 Moderate CentOS 7 haproxy Security Update
http://lwn.net/Alerts/612982/
+ Cisco IOS Software Network Address Translation Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-nat
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3361
+ Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-sip
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3360
+ Multiple Vulnerabilities in Cisco IOS Software Multicast Domain Name System
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-mdns
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3357
+ Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-dhcpv6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3359
+ Cisco IOS Software Metadata Vulnerabilities
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3355
+ Cisco IOS Software RSVP Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-rsvp
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3354
+ UPDATE: HPSBMU03086 rev.3 - HP Operations Agent for Linux including Glance, Local Elevation of Privilege
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04394554-3%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: HPSBMU03094 rev.2 - HP Connect-IT, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04401666-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04451722-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ UPDATE: HPSBST03000 rev.5 - HP StoreEver ESL G3 Tape Library and Enterprise Library LTO-6 Tape Drives running OpenSSL, Remote Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-5%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ HPSBST03103 rev.1 - HP Storage EVA Command View Suite running OpenSSL, Remote Unauthorized Access, Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04425253-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ MySQL 5.7.5 released
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-5.html
+ VU#772676 Mozilla Network Security Services (NSS) fails to properly verify RSA signatures
http://www.kb.cert.org/vuls/id/772676
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ Network Security Services (NSS) ASN.1 Parsing Flaw Lets Remote Users Forge Certificates
http://www.securitytracker.com/id/1030899
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ SA61323 Yokogawa CENTUM Series / Exaopc Batch Management File Disclosure and Manipulation Vulnerability
http://secunia.com/advisories/61323/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5208
+ GNU Bash CVE-2014-6271 Remote Code Execution Vulnerability
http://www.securityfocus.com/bid/70103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ Mozilla Network Security Services CVE-2014-1568 Security Bypass Vulnerability
http://www.securityfocus.com/bid/70116
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
+ Linux Kernel CVE-2014-3631 Local Denial of Service Vulnerability
http://www.securityfocus.com/bid/70095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3631
緊急地震速報を装った迷惑メールが出回る、気象庁が注意を呼びかけ
http://itpro.nikkeibp.co.jp/atcl/news/14/092501055/?ST=security
【Apple IDの「困った!」にお答えします】
【第3回】Apple IDをもっと便利に、賢く使うワザ
http://itpro.nikkeibp.co.jp/atcl/column/14/091800071/091800003/?ST=security
JVNVU#96848844 FortiGate および FortiWiFi アプライアンスに複数の脆弱性
http://jvn.jp/vu/JVNVU96848844/
UPDATE: JVNVU#93614707 OpenSSL クライアントにナルポインタ参照の脆弱性
http://jvn.jp/vu/JVNVU93614707/index.html
REMOTE: EMC AlphaStor Device Manager Opcode 0x75 Command Injection
http://www.exploit-db.com/exploits/34756
REMOTE: Advantech WebAccess dvs.ocx GetColor Buffer Overflow
http://www.exploit-db.com/exploits/34757
DoS/PoC: WS10 Data Server SCADA Exploit Overflow PoC
http://www.exploit-db.com/exploits/34752
2014年9月24日水曜日
24日 水曜日、先負
+ RHSA-2014:1281 Moderate: kernel security and bug fix update
https://access.redhat.com/errata/RHSA-2014:1281
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
+ Selenium IDE 2.7.0 released
https://code.google.com/p/selenium/wiki/SeIDEReleaseNotes
+ Selenium Server 2.43.1 released
http://code.google.com/p/selenium/wiki/Grid2
+ Selenium Internet Explorer Driver Server 2.43.0 released
http://selenium.googlecode.com/git/cpp/iedriverserver/CHANGELOG
+ Selenium Client & WebDriver 2.43.1 released
http://selenium.googlecode.com/git/java/CHANGELOG
+ CESA-2014:1281 Moderate CentOS 7 kernel Security Update
http://lwn.net/Alerts/612873/
+ Lightning Calendar 3.3.1 released
https://www.mozilla.org/en-US/projects/calendar/
+ BIND 9.10.1, 9.9.6, 9.8.8 released
https://kb.isc.org/article/AA-01209/81/BIND-9.10.1-Release-Notes.html
https://kb.isc.org/article/AA-01210/81/BIND-9.9.6-Release-Notes.html
https://kb.isc.org/article/AA-01211/81/BIND-9.8.8-Release-Notes.html
+ HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04451722-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ HPSBST03103 rev.1 - HP Storage EVA Command View Suite running OpenSSL, Remote Unauthorized Access, Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04425253-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ MySQL 5.6.21, 5.5.40 released
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-21.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-40.html
+ Sudo 1.8.11 released
http://www.sudo.ws/sudo/stable.html#1.8.11
+ nginx SSL Session Cache Reuse May Let Remote Users Hijack Sessions Across Virtual Hosts
http://www.securitytracker.com/id/1030882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3616
+ SA61385 Linux Kernel "SMB2_tcon()" NULL Pointer Dereference Denial of Service Vulnerability
http://secunia.com/advisories/61385/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7145
+ SA60109 Linux Kernel User Namespaces Mount Flags Handling Security Bypass Vulnerabilities
http://secunia.com/advisories/60109/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5207
JVNDB-2014-000111 Android 版アプリ「ゆこゆこ」における SSL サーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000111.html
JVNVU#96848844 FortiGate および FortiWiFi アプライアンスに複数の脆弱性
http://jvn.jp/vu/JVNVU96848844/
【「ソーシャル新人類」の不夜城?10代は何を考えているのか】
デマを簡単に信じる中高生、狭い空間での情報拡散をSNSが増幅
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/091900009/?ST=security
【世界のセキュリティ・ラボから】
HTTPSは100%安全の証? 油断は禁物
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/091800011/?ST=security
【Apple IDの「困った!」にお答えします】
【第2回】Apple IDで困ったときにはここをチェック!
http://itpro.nikkeibp.co.jp/atcl/column/14/091800071/091800002/?ST=security
スマホ版LINEのPINコード設定が義務化、不正ログインの被害拡大防止
http://itpro.nikkeibp.co.jp/atcl/news/14/092201017/?ST=security
独自解像度縮小技術で再生時に高精細化、画質と長時間を両立するネットワークカメラ
http://itpro.nikkeibp.co.jp/atcl/news/14/092201014/?ST=security
DoS/PoC: Fast Image Resizer 098 - Local Crash Poc
http://www.exploit-db.com/exploits/34720
DoS/PoC: Seafile-server <= 3.1.5 - Remote DoS
http://www.exploit-db.com/exploits/34729
https://access.redhat.com/errata/RHSA-2014:1281
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
+ Selenium IDE 2.7.0 released
https://code.google.com/p/selenium/wiki/SeIDEReleaseNotes
+ Selenium Server 2.43.1 released
http://code.google.com/p/selenium/wiki/Grid2
+ Selenium Internet Explorer Driver Server 2.43.0 released
http://selenium.googlecode.com/git/cpp/iedriverserver/CHANGELOG
+ Selenium Client & WebDriver 2.43.1 released
http://selenium.googlecode.com/git/java/CHANGELOG
+ CESA-2014:1281 Moderate CentOS 7 kernel Security Update
http://lwn.net/Alerts/612873/
+ Lightning Calendar 3.3.1 released
https://www.mozilla.org/en-US/projects/calendar/
+ BIND 9.10.1, 9.9.6, 9.8.8 released
https://kb.isc.org/article/AA-01209/81/BIND-9.10.1-Release-Notes.html
https://kb.isc.org/article/AA-01210/81/BIND-9.9.6-Release-Notes.html
https://kb.isc.org/article/AA-01211/81/BIND-9.8.8-Release-Notes.html
+ HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet Enterprise Printers using OpenSSL, Remote Unauthorized Access
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04451722-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ HPSBST03103 rev.1 - HP Storage EVA Command View Suite running OpenSSL, Remote Unauthorized Access, Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04425253-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ MySQL 5.6.21, 5.5.40 released
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-21.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-40.html
+ Sudo 1.8.11 released
http://www.sudo.ws/sudo/stable.html#1.8.11
+ nginx SSL Session Cache Reuse May Let Remote Users Hijack Sessions Across Virtual Hosts
http://www.securitytracker.com/id/1030882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3616
+ SA61385 Linux Kernel "SMB2_tcon()" NULL Pointer Dereference Denial of Service Vulnerability
http://secunia.com/advisories/61385/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7145
+ SA60109 Linux Kernel User Namespaces Mount Flags Handling Security Bypass Vulnerabilities
http://secunia.com/advisories/60109/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5207
JVNDB-2014-000111 Android 版アプリ「ゆこゆこ」における SSL サーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000111.html
JVNVU#96848844 FortiGate および FortiWiFi アプライアンスに複数の脆弱性
http://jvn.jp/vu/JVNVU96848844/
【「ソーシャル新人類」の不夜城?10代は何を考えているのか】
デマを簡単に信じる中高生、狭い空間での情報拡散をSNSが増幅
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/091900009/?ST=security
【世界のセキュリティ・ラボから】
HTTPSは100%安全の証? 油断は禁物
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/091800011/?ST=security
【Apple IDの「困った!」にお答えします】
【第2回】Apple IDで困ったときにはここをチェック!
http://itpro.nikkeibp.co.jp/atcl/column/14/091800071/091800002/?ST=security
スマホ版LINEのPINコード設定が義務化、不正ログインの被害拡大防止
http://itpro.nikkeibp.co.jp/atcl/news/14/092201017/?ST=security
独自解像度縮小技術で再生時に高精細化、画質と長時間を両立するネットワークカメラ
http://itpro.nikkeibp.co.jp/atcl/news/14/092201014/?ST=security
DoS/PoC: Fast Image Resizer 098 - Local Crash Poc
http://www.exploit-db.com/exploits/34720
DoS/PoC: Seafile-server <= 3.1.5 - Remote DoS
http://www.exploit-db.com/exploits/34729
2014年9月22日月曜日
22日 月曜日、赤口
+ Mozilla Firefox 32.0.2 released
https://www.mozilla.org/en-US/firefox/32.0.2/releasenotes/
+ phpMyAdmin 4.2.9 is released
http://sourceforge.net/p/phpmyadmin/news/2014/09/phpmyadmin-429-is-released/
+ Courier-IMAP 4.15.1 released
http://www.courier-mta.org/download.html
+ PHP 5.4.33 Released
http://php.net/archive/2014.php#id2014-09-18-2
+ SA61299 FreeBSD update for kernel
http://secunia.com/advisories/61299/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230
JVNDB-2014-000110 Dotclear におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000110.html
JVNDB-2014-000109 Android 版 Bump における暗黙的 Intent の扱いに関する脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000109.html
UPDATE: JVN#53579095 FileMaker Pro におけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN53579095/index.html
UPDATE: JVN#85812843 FileMaker Pro における SSL サーバ証明書の検証不備の脆弱性
http://jvn.jp/jp/JVN85812843/index.html
【世界のセキュリティ・ラボから】
スマホのジャイロセンサーが盗聴マイクに?
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/091800010/?ST=security
チェックしておきたい脆弱性情報<2014.09.22>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/091800017/?ST=security
Apple IDの「困った!」にお答えします
【第1回】Apple IDを作る前に知っておきたいポイント
http://itpro.nikkeibp.co.jp/atcl/column/14/091800071/091800001/?ST=security
「個人情報が漏洩しました!」、三菱東京UFJ銀行をかたるフィッシング
http://itpro.nikkeibp.co.jp/atcl/news/14/091900993/?ST=security
Apple、プライバシーに関するCEOの公開書簡「あなたの信頼がすべて」
http://itpro.nikkeibp.co.jp/atcl/news/14/091900974/?ST=security
VU#730964 FortiNet FortiGate and FortiWiFi appliances contain multiple vulnerabilities
http://www.kb.cert.org/vuls/id/730964
DoS/PoC: Seafile-server <= 3.1.5 - Remote DoS
http://www.exploit-db.com/exploits/34729
https://www.mozilla.org/en-US/firefox/32.0.2/releasenotes/
+ phpMyAdmin 4.2.9 is released
http://sourceforge.net/p/phpmyadmin/news/2014/09/phpmyadmin-429-is-released/
+ Courier-IMAP 4.15.1 released
http://www.courier-mta.org/download.html
+ PHP 5.4.33 Released
http://php.net/archive/2014.php#id2014-09-18-2
+ SA61299 FreeBSD update for kernel
http://secunia.com/advisories/61299/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230
JVNDB-2014-000110 Dotclear におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000110.html
JVNDB-2014-000109 Android 版 Bump における暗黙的 Intent の扱いに関する脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000109.html
UPDATE: JVN#53579095 FileMaker Pro におけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN53579095/index.html
UPDATE: JVN#85812843 FileMaker Pro における SSL サーバ証明書の検証不備の脆弱性
http://jvn.jp/jp/JVN85812843/index.html
【世界のセキュリティ・ラボから】
スマホのジャイロセンサーが盗聴マイクに?
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/091800010/?ST=security
チェックしておきたい脆弱性情報<2014.09.22>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/091800017/?ST=security
Apple IDの「困った!」にお答えします
【第1回】Apple IDを作る前に知っておきたいポイント
http://itpro.nikkeibp.co.jp/atcl/column/14/091800071/091800001/?ST=security
「個人情報が漏洩しました!」、三菱東京UFJ銀行をかたるフィッシング
http://itpro.nikkeibp.co.jp/atcl/news/14/091900993/?ST=security
Apple、プライバシーに関するCEOの公開書簡「あなたの信頼がすべて」
http://itpro.nikkeibp.co.jp/atcl/news/14/091900974/?ST=security
VU#730964 FortiNet FortiGate and FortiWiFi appliances contain multiple vulnerabilities
http://www.kb.cert.org/vuls/id/730964
DoS/PoC: Seafile-server <= 3.1.5 - Remote DoS
http://www.exploit-db.com/exploits/34729
2014年9月19日金曜日
19日 金曜日、先負
+ UPDATE: HPSBST03000 rev.5 - HP StoreEver ESL G3 Tape Library and Enterprise Library LTO-6 Tape Drives running OpenSSL, Remote Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-5%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ PHP 5.5.17 is available
http://php.net/archive/2014.php#id2014-09-18-1
+ Apple OS X Server Input Validation Flaw in Xcode Server Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1030870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4406
+ Apple OS X Server Input Validation Flaw in Wiki Server Lets Remote Users Inject SQL Commands
http://www.securitytracker.com/id/1030869
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4424
+ Apple OS X Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges and Obtain Potentially Sensitive Information
http://www.securitytracker.com/id/1030868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4350
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4390
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4393
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4396
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4397
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4398
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4401
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4416
チェックしておきたい脆弱性情報<2014.09.19>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/091800016/?ST=security
【被害最小化の切り札「CSIRT」】
CSIRT運用、三つの掟
http://itpro.nikkeibp.co.jp/atcl/column/14/090500060/090500004/?ST=security
脆弱性見つける報奨金制度、予想超える成果もリスク覚悟
http://itpro.nikkeibp.co.jp/atcl/column/14/090100053/091700009/?ST=security
キヤノンITが情報漏えいを防ぐ送信メール保留ソフトにiPhone画面を追加
http://itpro.nikkeibp.co.jp/atcl/news/14/091800959/?ST=security
児童の個人情報保護問題でYelpに罰金45万ドル、TinyCoは30万ドル
http://itpro.nikkeibp.co.jp/atcl/news/14/091800947/?ST=security
キングソフトがセキュリティソフト新版、有料版と無料版で提供開始
無料版はIEのホームを同社ポータルに設定しポップアップを出さないバージョンも
http://itpro.nikkeibp.co.jp/atcl/news/14/091700929/?ST=security
富士通BSCの情報漏洩対策ソフト、MTPスマホ接続も制御可能に
http://itpro.nikkeibp.co.jp/atcl/news/14/091700935/?ST=security
ハミングヘッズ、サイバー攻撃対策ソフト新版で英語画面を追加
http://itpro.nikkeibp.co.jp/atcl/news/14/091700938/?ST=security
JVNVU#95634161 CENTUM および Exaopc において任意のファイルにアクセス可能な脆弱性
http://jvn.jp/vu/JVNVU95634161/
UPDATE: JVNVU#93614707 OpenSSL クライアントにナルポインタ参照の脆弱性
http://jvn.jp/vu/JVNVU93614707/index.html
UPDATE: JVNVU#98509080 UEFI EDK2 の Capsule Update 処理に複数の脆弱性
http://jvn.jp/vu/JVNVU98509080/index.html
UPDATE: JVN#53579095 FileMaker Pro におけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN53579095/index.html
UPDATE: JVN#85812843 FileMaker Pro における SSL サーバ証明書の検証不備の脆弱性
http://jvn.jp/jp/JVN85812843/index.html
JVNVU#93868849 複数の Apple 製品の脆弱性に対するアップデート
http://jvn.jp/vu/JVNVU93868849/index.html
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-5%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ PHP 5.5.17 is available
http://php.net/archive/2014.php#id2014-09-18-1
+ Apple OS X Server Input Validation Flaw in Xcode Server Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1030870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4406
+ Apple OS X Server Input Validation Flaw in Wiki Server Lets Remote Users Inject SQL Commands
http://www.securitytracker.com/id/1030869
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4424
+ Apple OS X Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges and Obtain Potentially Sensitive Information
http://www.securitytracker.com/id/1030868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4350
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4390
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4393
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4396
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4397
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4398
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4399
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4401
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4416
チェックしておきたい脆弱性情報<2014.09.19>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/091800016/?ST=security
【被害最小化の切り札「CSIRT」】
CSIRT運用、三つの掟
http://itpro.nikkeibp.co.jp/atcl/column/14/090500060/090500004/?ST=security
脆弱性見つける報奨金制度、予想超える成果もリスク覚悟
http://itpro.nikkeibp.co.jp/atcl/column/14/090100053/091700009/?ST=security
キヤノンITが情報漏えいを防ぐ送信メール保留ソフトにiPhone画面を追加
http://itpro.nikkeibp.co.jp/atcl/news/14/091800959/?ST=security
児童の個人情報保護問題でYelpに罰金45万ドル、TinyCoは30万ドル
http://itpro.nikkeibp.co.jp/atcl/news/14/091800947/?ST=security
キングソフトがセキュリティソフト新版、有料版と無料版で提供開始
無料版はIEのホームを同社ポータルに設定しポップアップを出さないバージョンも
http://itpro.nikkeibp.co.jp/atcl/news/14/091700929/?ST=security
富士通BSCの情報漏洩対策ソフト、MTPスマホ接続も制御可能に
http://itpro.nikkeibp.co.jp/atcl/news/14/091700935/?ST=security
ハミングヘッズ、サイバー攻撃対策ソフト新版で英語画面を追加
http://itpro.nikkeibp.co.jp/atcl/news/14/091700938/?ST=security
JVNVU#95634161 CENTUM および Exaopc において任意のファイルにアクセス可能な脆弱性
http://jvn.jp/vu/JVNVU95634161/
UPDATE: JVNVU#93614707 OpenSSL クライアントにナルポインタ参照の脆弱性
http://jvn.jp/vu/JVNVU93614707/index.html
UPDATE: JVNVU#98509080 UEFI EDK2 の Capsule Update 処理に複数の脆弱性
http://jvn.jp/vu/JVNVU98509080/index.html
UPDATE: JVN#53579095 FileMaker Pro におけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN53579095/index.html
UPDATE: JVN#85812843 FileMaker Pro における SSL サーバ証明書の検証不備の脆弱性
http://jvn.jp/jp/JVN85812843/index.html
JVNVU#93868849 複数の Apple 製品の脆弱性に対するアップデート
http://jvn.jp/vu/JVNVU93868849/index.html
2014年9月18日木曜日
About the security content of iOS 8
About the security content of iOS 8
http://support.apple.com/kb/HT6441
上記 URL の iOS のセキュリティアップデートの翻訳
1) 802.1X
攻撃者が WiFi アクセスポイントになりすますことで、LEAP認証を要求して MS-CHAPv1ハッシュを壊してアクセスポイントが強力な認証手法をサポートしていても、意図したアクセスポイントの認証に得られた認証情報を使用される脆弱性。(CVE-2014-4364)
2) Accounts
アカウント制御機能に欠陥が存在することが原因で、サンドボックスされたアプリケーションがアカウントの名前を含んだ現在有効な iCloud アカウントについての情報を取得できる脆弱性。(CVE-2014-4423)
3) Accessibility
AssistiveTouch のイベントの取り扱いに論理的な欠陥が存在することが原因で、画面ロックしなくなる脆弱性。(CVE-2014-4368)
4) Accounts Framework
傷つきやすいユーザの情報が記録される脆弱性。(CVE-2014-4357)
5) Address Book
アドレス帳の暗号化がハードウェアの UID だけで保護されたキーを用いている脆弱性。(CVE-2014-4352)
6) App Installation
アプリケーションインストールに競合状態が存在することが原因で、/tmp に書き込み許可のある攻撃者が検証されていないアプリケーションをインストールできる脆弱性。(CVE-2014-4386)
7) App Installation
アプリケーションインストールにパストラバーサルの結果が存在することが原因で、ローカルの攻撃者がコード署名検証を再標的化して、検証されていないアプリケーションをインストールできる脆弱性。(CVE-2014-4384)
8) Assets
更新チェック応答の取り扱いに検証の欠陥が存在することが原因で、応答ヘッダーの Last-Modified から日付を抜き出して、サブシーケンス更新要求のチェックに使用される If-Modified-Since に未来の日付をセットできる脆弱性。(CVE-2014-4383)
9) Bluetooth
Bluetooth が iOS をアップグレードした後自動的に有効になる脆弱性。(CVE-2014-4354)
10) Crtificate Trust Policy
信用証明書ポリシーが更新された。
11) CoreGraphics
PDF ファイルの取り扱いに整数オーバーフローが存在することが原因で、悪意のある PDF ファイルを開くことでアプリケーションが異常終了したり、任意のコードを実行されたりする脆弱性。(CVE-2014-4377)
12) CoreGraphics
PDF ファイルの取り扱いにメモリ領域外の読み込みが存在することが原因で、悪意のある PDF ファイルを開くことでアプリケーションが異常終了したり、任意のコードを実行されたりする脆弱性。(CVE-2014-4378)
13) Data Detectors
メールが facetime-audio:// URL を実行する前にユーザに尋ねない脆弱性。(CVE-2013-6835)
14) Foundation
NSXMLParser の XML の取り扱いに XML External Entity の欠陥が存在することが原因で、NSXMLParser を使うアプリケーションが情報を開示するために誤って使われる脆弱性。CVE-2014-4374)
15) Home & Lock Screen
frontmost アプリと決定するプライベートの API が十分なアクセス制御をされていないことが原因で、バックグラウンドのアプリがアプリが frontmost であるか決定することができる脆弱性。CVE-2014-4361)
16) iMessage
添付ファイルを検出する方法に競合状態が存在することが原因で、iMessage または MMS が削除された後、添付ファイルが残ってしまう脆弱性。(CVE-2014-4353)
17) IOAcceleratorFamily
IOAcceleratorFamily API の引数の取り扱いに NULL ポインタ逆参照が存在することが原因で、アプリケーションが異常終了する脆弱性。(CVE-2014-4369)
18) IOAcceleratorFamily
IntelAccelerator ドライバに NULL ポインタ逆参照が存在することが原因で、ドライバが意味不明のリスタートをする脆弱性。(CVE-2014-4373)
19) IOHIDFamily
IOHIDFamily 関数の取り扱いに領域外読み込みの欠陥が存在することが原因で、悪意のあるアプリケーションがカーネルのポインタを読み込むことができ、カーネルのアドレス空間レイアウトランダム化を回避できる脆弱性。(CVE-2014-4379)
20) IOHIDFamily
IOHIDFamily のキーマッピング属性の取り扱いにヒープバッファオーバーフローが存在することが原因で、悪意のあるアプリケーションがシステム権限で任意のコードを実行できる脆弱性。(CVE-2014-4404)
21) IOHIDFamily
IOHIDFamily のキーマッピング属性の取り扱いに NULL ポインタ逆参照が存在することが原因で、悪意のあるアプリケーションがシステム権限で任意のコードを実行できる脆弱性。(CVE-2014-4405)
22) IOHIDFamily
IOHIDFamily カーネル拡張に領域外書き込みの欠陥が存在することが原因で、悪意のあるアプリケーションがシステム権限で任意のコードを実行できる脆弱性。(CVE-2014-4380)
23) IOKit
IOKit 関するの取り扱いに初期化されていないメモリへのアクセスの欠陥が存在することが原因で、悪意のあるアプリケーションがカーネルメモリから初期化されていないデータを読み込むことができる脆弱性。(CVE-2014-4407)
24) IOKit
IODataQueue オブジェクトのある metadata フィールドの取り扱いに検証の欠陥が存在することが原因で、悪意のあるアプリケーションがシステム権限で任意のコードを実行できる脆弱性。(CVE-2014-4418)
25) IOKit
IODataQueue オブジェクトのある metadata フィールドの取り扱いに検証の欠陥が存在することが原因で、悪意のあるアプリケーションがシステム権限で任意のコードを実行できる脆弱性。(CVE-2014-4388)
26) IOKit
IOKit 関数の取り扱いに整数オーバーフローが存在することが原因で、悪意のあるアプリケーションがシステム権限で任意のコードを実行できる脆弱性。(CVE-2014-4389)
27) Kernel
ネットワーク統計インターフェースに複数の初期化されないメモリの欠陥が存在することが原因で、カーネルメモリを開示されることでローカルユーザがカーネルメモリレイアウトを決定できる脆弱性。(CVE-2014-4371, CVE-2014-4419, CVE-2014-4420, CVE-2014-4421)
28) Kernel
IPv6 パケットの取り扱いに競合状態の欠陥が存在することが原因で、特権のネットワーク位置を持つ人がサービス拒否できる脆弱性。(CVE-2014-2391)
29) Kernel
Mach ポートの取り扱いにメモリの二重解放の欠陥が存在することが原因で、ローカルユーザがシステムを異常終了させたり、カーネル上で任意のコードを実行したりする脆弱性。(CVE-2014-4375)
30) Kernel
rt_setgate に領域外読み込みの欠陥が存在することが原因で、ローカルユーザがシステムを異常終了させたり、カーネル上で任意のコードを実行したりする脆弱性。(CVE-2014-4408)
31) Kernel
ブートプロセスにおけるカーネルの硬化評価のために使用される乱数発生機が暗号的に安全でないことが原因で、あるカーネルの硬化評価が回避される脆弱性。(CVE-2014-4422)
32) Libnotify
Libnotify に領域外書き込みの欠陥が存在することが原因で、悪意のあるアプリケーションが root 権限で任意のコードを実行できる脆弱性。(CVE-2014-4381)
33) Lockdown
活性化ロック状態であるのにホーム画面に進んでしまうアンロック挙動にある欠陥が原因で、装置がロックされている時にホーム画面に正しくなく渡る脆弱性。(CVE-2014-1360)
34) Mail
サーバが LOGINDISABLED IMAP 機能を公告しているのにメールがサーバに LOGIN コマンドを送ることで、ログイン認証を平文で送ってしまう脆弱性。(CVE-2014-4366)
35) Mail
メールの添付ファイルの Data Protection の使用に論理的な欠陥が存在することが原因で、iOS 装置に物理的にアクセスできる人がメールの添付ファイルを読むことができる脆弱性。(CVE-2014-1348)
36) Profiles
iOSをアップグレードした後、自動的に Voice Dial が有効となる。(CVE-2014-4367)
37) Safari
Safari がメインフレームと異なるドメインからサブフレームにあるユーザ名とパスワード自動挿入する。(CVE-2013-5227)
38) Safari
保存されたパスワードが http サイトに自動挿入される。(CVE-2014-4363)
39) Sandbox Profiles
サードパーティアプリサンドボックスに情報漏洩の欠陥が存在することが原因で、Apple ID 情報がサードパーティアプリによてアクセス可能となる脆弱性。(CVE-2014-4362)
40) Settings
ロック画面でテキストメッセージ通知のプレビューに欠陥が存在することが原因で、テキストメッセージプレビューが機能が無効であってもロック画面に表示される脆弱性。(CVE-2014-4356)
41) syslog
syslogd がファイルのアクセス権限を変更している間にシンボリックリンクを監視することに欠陥が存在することが原因で、任意のファイルのアクセス権限を変更できる脆弱性。(CVE-2014-4372)
42) Weather
ローカル天気を決定するのに使用される API に情報漏洩の欠陥が存在することが原因で、ロケーション情報が暗号化されずに送信される脆弱性。
43) WebKit
Web アプリケーションが通常のブラウジングの間 HTML 5 アプリケーションキャッシュデータを保持して、プライベートのブラウジングの間データを読み込む処理に欠陥が存在することが原因で、悪意のある Web サイトがプライベートのブラウジングが有効であってもユーザを追跡できる脆弱性。(CVE-2014-4409)
44) WebKit
WebKit に複数のメモリ破壊の欠陥が存在することが原因で、悪意のある Web サイトを悦らいすることでアプリケーションが異常終了したり、任意のコードを実行されたりする脆弱性。(CVE-2013-6663, CVE-2014-1384, CVE-2014-1385, CVE-2014-1387, CVE-2014-1388, CVE-2014-1389, CVE-2014-4410, CVE-2014-4411, CVE-2014-4412, CVE-2014-4413, CVE-2014-4414, CVE-2014-4415)
45) WiFi
静的 MAC アドレスが WiFi ネットワークのスキャンに使用されていることで情報漏洩の欠陥が存在することが原因で、装置が WiFi MAC アドレスによって受動的に追跡される脆弱性。
18日 木曜日、友引
+ Red Hat Enterprise Linux 5.11 released
https://rhn.redhat.com/errata/RHEA-2014-1230.html
+ RHSA-2014:1255 Moderate: krb5 security update
https://rhn.redhat.com/errata/RHSA-2014-1255.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
+ About the security content of Xcode 6.0.1
http://support.apple.com/kb/HT6444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
+ About the security content of Apple TV 7
http://support.apple.com/kb/HT6442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4415
+ About the security content of iOS 8
http://support.apple.com/kb/HT6441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4423
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4368
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4386
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4354
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4374
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4361
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1348
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4367
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4409
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4415
+ HPSBOV03099 rev.1 - HP OpenVMS running OpenSSL, Remote Denial of Service (DoS) or Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04426586-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
+ Linux kernel 3.16.3, 3.14.19, 3.10.55 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.55
+ Google Android Browser Access Control Flaw Lets Remote Users Bypass Same Origin Policy
http://www.securitytracker.com/id/1030861
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041
+ SA61273 nginx SSL Session Cache Security Bypass Security Issue
http://secunia.com/advisories/61273/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3616
+ SA60523 Node.js OpenSSL and V8 Vulnerabilities
http://secunia.com/advisories/60523/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6668
+ SA61290 Wireshark Multiple Denial of Service Vulnerabilities
http://secunia.com/advisories/61290/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6426
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428
+ Apple iOS Prior to iOS 8 and TV Prior to TV 7 Multiple Vulnerabilities
http://www.securityfocus.com/bid/69882
+ WebKit Multiple Unspecified Memory Corruption Vulnerabilities
http://www.securityfocus.com/bid/69881
+ Linux Kernel 'SMB2_tcon' NULL Pointer Dereference Denial of Service Vulnerability
http://www.securityfocus.com/bid/69867
JVNDB-2014-000106 365 Links シリーズにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000106.html
JVNVU#95634161 CENTUM および Exaopc において任意のファイルにアクセス可能な脆弱性
http://jvn.jp/vu/JVNVU95634161/
https://rhn.redhat.com/errata/RHEA-2014-1230.html
+ RHSA-2014:1255 Moderate: krb5 security update
https://rhn.redhat.com/errata/RHSA-2014-1255.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
+ About the security content of Xcode 6.0.1
http://support.apple.com/kb/HT6444
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
+ About the security content of Apple TV 7
http://support.apple.com/kb/HT6442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4415
+ About the security content of iOS 8
http://support.apple.com/kb/HT6441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4423
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4368
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4386
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4354
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4374
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4361
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4404
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1348
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4367
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4363
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4362
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4409
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1388
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4415
+ HPSBOV03099 rev.1 - HP OpenVMS running OpenSSL, Remote Denial of Service (DoS) or Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04426586-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
+ Linux kernel 3.16.3, 3.14.19, 3.10.55 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.19
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.55
+ Google Android Browser Access Control Flaw Lets Remote Users Bypass Same Origin Policy
http://www.securitytracker.com/id/1030861
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041
+ SA61273 nginx SSL Session Cache Security Bypass Security Issue
http://secunia.com/advisories/61273/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3616
+ SA60523 Node.js OpenSSL and V8 Vulnerabilities
http://secunia.com/advisories/60523/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6668
+ SA61290 Wireshark Multiple Denial of Service Vulnerabilities
http://secunia.com/advisories/61290/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6426
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428
+ Apple iOS Prior to iOS 8 and TV Prior to TV 7 Multiple Vulnerabilities
http://www.securityfocus.com/bid/69882
+ WebKit Multiple Unspecified Memory Corruption Vulnerabilities
http://www.securityfocus.com/bid/69881
+ Linux Kernel 'SMB2_tcon' NULL Pointer Dereference Denial of Service Vulnerability
http://www.securityfocus.com/bid/69867
JVNDB-2014-000106 365 Links シリーズにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000106.html
JVNVU#95634161 CENTUM および Exaopc において任意のファイルにアクセス可能な脆弱性
http://jvn.jp/vu/JVNVU95634161/
2014年9月17日水曜日
17日 水曜日、先勝
+ RHSA-2014:1243 Low: automake security update
https://rhn.redhat.com/errata/RHSA-2014-1243.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386
+ RHSA-2014:1245 Moderate: krb5 security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1245.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
+ RHSA-2014:1244 Moderate: bind97 security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1244.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
+ RHSA-2014:1246 Moderate: nss and nspr security, bug fix, and enhancement update
https://rhn.redhat.com/errata/RHSA-2014-1246.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
+ nginx 1.7.5, 1.6.2 released
http://nginx.org/en/CHANGES
http://nginx.org/en/CHANGES-1.6
+ nginx: SSL session reuse vulnerability
http://nginx.org/en/security_advisories.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3616
+ APSB14-20 Security Updates available for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0568
+ CESA-2014:1193 Important CentOS 6 axis Security Update
http://lwn.net/Alerts/612077/
+ CESA-2014:1193 Important CentOS 5 axis Security Update
http://lwn.net/Alerts/612078/
+ Wireshark 1.12.1, 1.10.10 released
https://www.wireshark.org/docs/relnotes/wireshark-1.12.1.html
https://www.wireshark.org/docs/relnotes/wireshark-1.10.10.html
+ FreeBSD-SA-14:19.tcp Denial of Service in TCP packet processing
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230
+ Adobe Acrobat/Reader Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1030853
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0568
+ Juniper Junos Pulse Secure Access Service (SSL VPN) Input Validation Flaw Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1030852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3820
+ SA61138 Linux Kernel "assoc_array_gc()" NULL Pointer Dereference Vulnerability
http://secunia.com/advisories/61138/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3631
+ MantisBT Null Byte Poisoning LDAP Authentication Bypass Vulnerability
http://www.securityfocus.com/bid/69780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6387
【「ソーシャル新人類」の不夜城?10代は何を考えているのか】
理由は「過去を消すため」、SNSに入退会を繰り返す10代の事情
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/091000008/?ST=security
【被害最小化の切り札「CSIRT」】
個人では限界、公認チームが不可欠
http://itpro.nikkeibp.co.jp/atcl/column/14/090500060/090500002/?ST=security
https://rhn.redhat.com/errata/RHSA-2014-1243.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386
+ RHSA-2014:1245 Moderate: krb5 security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1245.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
+ RHSA-2014:1244 Moderate: bind97 security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1244.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
+ RHSA-2014:1246 Moderate: nss and nspr security, bug fix, and enhancement update
https://rhn.redhat.com/errata/RHSA-2014-1246.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545
+ nginx 1.7.5, 1.6.2 released
http://nginx.org/en/CHANGES
http://nginx.org/en/CHANGES-1.6
+ nginx: SSL session reuse vulnerability
http://nginx.org/en/security_advisories.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3616
+ APSB14-20 Security Updates available for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0568
+ CESA-2014:1193 Important CentOS 6 axis Security Update
http://lwn.net/Alerts/612077/
+ CESA-2014:1193 Important CentOS 5 axis Security Update
http://lwn.net/Alerts/612078/
+ Wireshark 1.12.1, 1.10.10 released
https://www.wireshark.org/docs/relnotes/wireshark-1.12.1.html
https://www.wireshark.org/docs/relnotes/wireshark-1.10.10.html
+ FreeBSD-SA-14:19.tcp Denial of Service in TCP packet processing
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:19.tcp.asc
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0230
+ Adobe Acrobat/Reader Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Conduct Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1030853
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0568
+ Juniper Junos Pulse Secure Access Service (SSL VPN) Input Validation Flaw Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1030852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3820
+ SA61138 Linux Kernel "assoc_array_gc()" NULL Pointer Dereference Vulnerability
http://secunia.com/advisories/61138/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3631
+ MantisBT Null Byte Poisoning LDAP Authentication Bypass Vulnerability
http://www.securityfocus.com/bid/69780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6387
【「ソーシャル新人類」の不夜城?10代は何を考えているのか】
理由は「過去を消すため」、SNSに入退会を繰り返す10代の事情
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/091000008/?ST=security
【被害最小化の切り札「CSIRT」】
個人では限界、公認チームが不可欠
http://itpro.nikkeibp.co.jp/atcl/column/14/090500060/090500002/?ST=security
2014年9月16日火曜日
16日 火曜日、赤口
+ RHSA-2014:1193 Important: axis security update
https://rhn.redhat.com/errata/RHSA-2014-1193.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596
+ Mozilla Firefox 32.0.1 released
https://www.mozilla.org/en-US/firefox/32.0.1/releasenotes/
+ UPDATE: APSB14-20 Prenotification Security Advisory for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
+ phpMyAdmin 4.0.10.3, 4.1.14.4 and 4.2.8.1 are released
http://sourceforge.net/p/phpmyadmin/news/2014/09/phpmyadmin-40103-41144-and-4281-are-released/
+ PMASA-2014-10 XSRF/CSRF due to DOM based XSS in the micro history feature
http://www.phpmyadmin.net/home_page/security/PMASA-2014-10.php
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6300
+ UPDATE: HPSBGN02740 rev.2 - HP Operations Manager, Operations Agent, Performance Agent, Service Health Reporter, Service Health Optimizer, Performance Manager, Remote Execution of Arbitrary Code
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03179825-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ HPSBMU03075 rev.1 - HP Network Node Manager I (NNMi) for Windows and Linux, Remote Execution of Arbitrary Code
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04378450-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2624
+ HPSBOV03099 rev.1 - HP OpenVMS running OpenSSL, Remote Denial of Service (DoS) or Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04426586-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
+ Linux kernel 3.2.63 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.63
+ Multiple vulnerabilities fixed in Firefox 24.2.0 ESR
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_fixed_in_firefox
+ CVE-2014-5356 Permissions, Privileges, and Access Control vulnerability in OpenStack Glance
https://blogs.oracle.com/sunsecurity/entry/cve_2014_5356_permissions_privileges
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5356
+ CVE-2014-3594 Cross-site scripting (XSS) vulnerability vulnerability in OpenStack Horizon
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3594_cross_site
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3594
+ CVE-2014-3589 Input Validation vulnerability in Python Imaging Library (PIL)
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3589_input_validation
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3589
+ Multiple Buffer Errors vulnerabilities in Wireshark
https://blogs.oracle.com/sunsecurity/entry/multiple_buffer_errors_vulnerabilities_in3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165
+ Multiple Denial Of Service(DoS) vulnerabilities in Apache HTTP Server
https://blogs.oracle.com/sunsecurity/entry/multiple_denial_of_service_dos5
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
+ Multiple vulnerabilities in Net-SNMP
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_net_snmp
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2310
+ CVE-2014-3508 Information Disclosure vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
+ CVE-2014-5139 Denial Of Service(DoS) vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_5139_denial_of
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
+ CVE-2014-3509 Race Conditions vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3509_race_conditions
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
+ CVE-2014-3505 Denial Of Service(DoS) vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3505_denial_of
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
+ CVE-2014-3506 Resource Management Errors vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3506_resource_management
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
+ CVE-2014-3507 Resource Management Errors vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3507_resource_management
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
+ CVE-2014-3510 Denial Of Service(DoS) vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3510_denial_of
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
+ CVE-2014-3511 Cryptographic vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3511_cryptographic_vulnerability
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
+ CVE-2014-3512 Buffer Errors vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3512_buffer_errors
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
+ CVE-2014-0178 Information Disclosure vulnerability in Samba
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0178_information_disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
+ CVE-2014-0092 Cryptographic Issues vulnerability in GnuTLS
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0092_cryptographic_issues
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
+ Multiple Input Validation vulnerabilities in Apache HTTP Server
https://blogs.oracle.com/sunsecurity/entry/multiple_input_validation_vulnerabilities_in1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
+ Multiple vulnerabilities in Samba
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
+ Samba 4.0.22 Available for Download
http://samba.org/samba/history/samba-4.0.22.html
+ Moodle Bugs Let Remote Users Obtain Potentially Sensitive Information and Bypass Security Controls
http://www.securitytracker.com/id/1030839
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3617
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4172
+ Squid Off-by-One in snmpHandleUdp() Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1030838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270
+ SA61010 phpMyAdmin Micro History DOM-based Cross-Site Scripting Vulnerability
http://secunia.com/advisories/61010/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6300
+ SA61203 Moodle phpCAS Security Bypass Vulnerability
http://secunia.com/advisories/61203/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4172
+ Linux Kernel udf infinite loop when processing indirect ICBs
http://cxsecurity.com/issue/WLB-2014090071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410
+ Linux Kernel net guard tcp_set_keepalive against crash
http://cxsecurity.com/issue/WLB-2014090072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657
+ Linux Kernel 'tcp_set_keepalive()' Function Denial of Service Vulnerability
http://www.securityfocus.com/bid/69803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657
+ phpMyAdmin Micro History Feature Cross Site Scripting Vulnerability
http://www.securityfocus.com/bid/69790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6300
+ Linux Kernel CVE-2014-3185 'whiteheat.c' Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/69781
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185
LedgerSMB 1.4.0 Released
http://www.postgresql.org/about/news/1543/
JVNDB-2014-000105 複数の Adobe 製品のヘルプページにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000105.html
JVNVU#97910946 Embarcadero Delphi と C++Builder の VCL にバッファオーバーフローの脆弱性
http://jvn.jp/vu/JVNVU97910946/
【社長に説明できるセキュリティ】
社内営業で経営層の判断を促す(後編)リスクを点数化して優先度を付ける
http://itpro.nikkeibp.co.jp/atcl/column/14/511845/090300002/?ST=security
【被害最小化の切り札「CSIRT」】
遅れる対応、拡大する被害
http://itpro.nikkeibp.co.jp/atcl/column/14/090500060/090500001/?ST=security
日産がサイバー攻撃に2カ月気づかず、「ステルス改ざん」にご用心
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/091200054/?ST=security
JR東の「My JR-EAST」サイトに2万件の不正ログイン、サービス停止
http://itpro.nikkeibp.co.jp/atcl/news/14/091200877/?ST=security
ショートカット悪用の標的型攻撃が急増、Androidスマホも狙われる
http://itpro.nikkeibp.co.jp/atcl/news/14/091200873/?ST=security
REMOTE: Http File Server 2.3.x - Remote Command Execution
http://www.exploit-db.com/exploits/34668
REMOTE: Railo Remote File Include
http://www.exploit-db.com/exploits/34669
REMOTE: ManageEngine Eventlog Analyzer Arbitrary File Upload
http://www.exploit-db.com/exploits/34670
REMOTE: SolarWinds Storage Manager Authentication Bypass
http://www.exploit-db.com/exploits/34671
https://rhn.redhat.com/errata/RHSA-2014-1193.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596
+ Mozilla Firefox 32.0.1 released
https://www.mozilla.org/en-US/firefox/32.0.1/releasenotes/
+ UPDATE: APSB14-20 Prenotification Security Advisory for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
+ phpMyAdmin 4.0.10.3, 4.1.14.4 and 4.2.8.1 are released
http://sourceforge.net/p/phpmyadmin/news/2014/09/phpmyadmin-40103-41144-and-4281-are-released/
+ PMASA-2014-10 XSRF/CSRF due to DOM based XSS in the micro history feature
http://www.phpmyadmin.net/home_page/security/PMASA-2014-10.php
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6300
+ UPDATE: HPSBGN02740 rev.2 - HP Operations Manager, Operations Agent, Performance Agent, Service Health Reporter, Service Health Optimizer, Performance Manager, Remote Execution of Arbitrary Code
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03179825-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ HPSBMU03075 rev.1 - HP Network Node Manager I (NNMi) for Windows and Linux, Remote Execution of Arbitrary Code
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04378450-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2624
+ HPSBOV03099 rev.1 - HP OpenVMS running OpenSSL, Remote Denial of Service (DoS) or Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04426586-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
+ Linux kernel 3.2.63 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.63
+ Multiple vulnerabilities fixed in Firefox 24.2.0 ESR
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_fixed_in_firefox
+ CVE-2014-5356 Permissions, Privileges, and Access Control vulnerability in OpenStack Glance
https://blogs.oracle.com/sunsecurity/entry/cve_2014_5356_permissions_privileges
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5356
+ CVE-2014-3594 Cross-site scripting (XSS) vulnerability vulnerability in OpenStack Horizon
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3594_cross_site
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3594
+ CVE-2014-3589 Input Validation vulnerability in Python Imaging Library (PIL)
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3589_input_validation
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3589
+ Multiple Buffer Errors vulnerabilities in Wireshark
https://blogs.oracle.com/sunsecurity/entry/multiple_buffer_errors_vulnerabilities_in3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165
+ Multiple Denial Of Service(DoS) vulnerabilities in Apache HTTP Server
https://blogs.oracle.com/sunsecurity/entry/multiple_denial_of_service_dos5
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
+ Multiple vulnerabilities in Net-SNMP
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_net_snmp
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2310
+ CVE-2014-3508 Information Disclosure vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3508_information_disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
+ CVE-2014-5139 Denial Of Service(DoS) vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_5139_denial_of
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
+ CVE-2014-3509 Race Conditions vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3509_race_conditions
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
+ CVE-2014-3505 Denial Of Service(DoS) vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3505_denial_of
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
+ CVE-2014-3506 Resource Management Errors vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3506_resource_management
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
+ CVE-2014-3507 Resource Management Errors vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3507_resource_management
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
+ CVE-2014-3510 Denial Of Service(DoS) vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3510_denial_of
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
+ CVE-2014-3511 Cryptographic vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3511_cryptographic_vulnerability
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
+ CVE-2014-3512 Buffer Errors vulnerability in OpenSSL
https://blogs.oracle.com/sunsecurity/entry/cve_2014_3512_buffer_errors
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
+ CVE-2014-0178 Information Disclosure vulnerability in Samba
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0178_information_disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
+ CVE-2014-0092 Cryptographic Issues vulnerability in GnuTLS
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0092_cryptographic_issues
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
+ Multiple Input Validation vulnerabilities in Apache HTTP Server
https://blogs.oracle.com/sunsecurity/entry/multiple_input_validation_vulnerabilities_in1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
+ Multiple vulnerabilities in Samba
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
+ Samba 4.0.22 Available for Download
http://samba.org/samba/history/samba-4.0.22.html
+ Moodle Bugs Let Remote Users Obtain Potentially Sensitive Information and Bypass Security Controls
http://www.securitytracker.com/id/1030839
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3617
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4172
+ Squid Off-by-One in snmpHandleUdp() Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1030838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270
+ SA61010 phpMyAdmin Micro History DOM-based Cross-Site Scripting Vulnerability
http://secunia.com/advisories/61010/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6300
+ SA61203 Moodle phpCAS Security Bypass Vulnerability
http://secunia.com/advisories/61203/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4172
+ Linux Kernel udf infinite loop when processing indirect ICBs
http://cxsecurity.com/issue/WLB-2014090071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410
+ Linux Kernel net guard tcp_set_keepalive against crash
http://cxsecurity.com/issue/WLB-2014090072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657
+ Linux Kernel 'tcp_set_keepalive()' Function Denial of Service Vulnerability
http://www.securityfocus.com/bid/69803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657
+ phpMyAdmin Micro History Feature Cross Site Scripting Vulnerability
http://www.securityfocus.com/bid/69790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6300
+ Linux Kernel CVE-2014-3185 'whiteheat.c' Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/69781
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185
LedgerSMB 1.4.0 Released
http://www.postgresql.org/about/news/1543/
JVNDB-2014-000105 複数の Adobe 製品のヘルプページにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000105.html
JVNVU#97910946 Embarcadero Delphi と C++Builder の VCL にバッファオーバーフローの脆弱性
http://jvn.jp/vu/JVNVU97910946/
【社長に説明できるセキュリティ】
社内営業で経営層の判断を促す(後編)リスクを点数化して優先度を付ける
http://itpro.nikkeibp.co.jp/atcl/column/14/511845/090300002/?ST=security
【被害最小化の切り札「CSIRT」】
遅れる対応、拡大する被害
http://itpro.nikkeibp.co.jp/atcl/column/14/090500060/090500001/?ST=security
日産がサイバー攻撃に2カ月気づかず、「ステルス改ざん」にご用心
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/091200054/?ST=security
JR東の「My JR-EAST」サイトに2万件の不正ログイン、サービス停止
http://itpro.nikkeibp.co.jp/atcl/news/14/091200877/?ST=security
ショートカット悪用の標的型攻撃が急増、Androidスマホも狙われる
http://itpro.nikkeibp.co.jp/atcl/news/14/091200873/?ST=security
REMOTE: Http File Server 2.3.x - Remote Command Execution
http://www.exploit-db.com/exploits/34668
REMOTE: Railo Remote File Include
http://www.exploit-db.com/exploits/34669
REMOTE: ManageEngine Eventlog Analyzer Arbitrary File Upload
http://www.exploit-db.com/exploits/34670
REMOTE: SolarWinds Storage Manager Authentication Bypass
http://www.exploit-db.com/exploits/34671
2014年9月12日金曜日
12日 金曜日、友引
+ UPDATE: HPSBGN02740 rev.2 - HP Operations Manager, Operations Agent, Performance Agent, Service Health Reporter, Service Health Optimizer, Performance Manager, Remote Execution of Arbitrary Code
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03179825-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ VMSA-2014-0009 VMware NSX and vCNS product updates address a critical information disclosure vulnerability.
http://www.vmware.com/security/advisories/VMSA-2014-0009.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3796
+ VMware vCloud Networking and Security (vCNS) Input Validation Flaw Lets Remote Users Obtain Sensitive Information
http://www.securitytracker.com/id/1030835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3796
+ SA60934 NetBSD Kernel Compatibility Multiple Vulnerabilities
http://secunia.com/advisories/60934/
+ SA60339 NetBSD Kernel "execve()" Two Denial of Service Vulnerabilities
http://secunia.com/advisories/60339/
+ SA59970 NetBSD Kernel "setsockopt()" Denial of Service Vulnerability
http://secunia.com/advisories/59970/
【「ソーシャル新人類」の不夜城?10代は何を考えているのか】
炎上事件やネット依存を生む「承認欲求」の暴走、コントロールの秘訣は
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/090400007/?ST=security
【新人D太と先輩M子のITビジネス日誌】
サイバースパイの新手法「水飲み場型攻撃」登場!セキュリティリテラシー向上で被害を防げ
http://itpro.nikkeibp.co.jp/atcl/column/14/493082/090800004/?ST=security
約500万件のGmailアドレスとパスワードが漏えい、流出元は別サイトか
http://itpro.nikkeibp.co.jp/atcl/news/14/091100836/?ST=security
VU#646748 Embarcadero Delphi and C++Builder VCL BMP file processing buffer overflow
http://www.kb.cert.org/vuls/id/646748
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03179825-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ VMSA-2014-0009 VMware NSX and vCNS product updates address a critical information disclosure vulnerability.
http://www.vmware.com/security/advisories/VMSA-2014-0009.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3796
+ VMware vCloud Networking and Security (vCNS) Input Validation Flaw Lets Remote Users Obtain Sensitive Information
http://www.securitytracker.com/id/1030835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3796
+ SA60934 NetBSD Kernel Compatibility Multiple Vulnerabilities
http://secunia.com/advisories/60934/
+ SA60339 NetBSD Kernel "execve()" Two Denial of Service Vulnerabilities
http://secunia.com/advisories/60339/
+ SA59970 NetBSD Kernel "setsockopt()" Denial of Service Vulnerability
http://secunia.com/advisories/59970/
【「ソーシャル新人類」の不夜城?10代は何を考えているのか】
炎上事件やネット依存を生む「承認欲求」の暴走、コントロールの秘訣は
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/090400007/?ST=security
【新人D太と先輩M子のITビジネス日誌】
サイバースパイの新手法「水飲み場型攻撃」登場!セキュリティリテラシー向上で被害を防げ
http://itpro.nikkeibp.co.jp/atcl/column/14/493082/090800004/?ST=security
約500万件のGmailアドレスとパスワードが漏えい、流出元は別サイトか
http://itpro.nikkeibp.co.jp/atcl/news/14/091100836/?ST=security
VU#646748 Embarcadero Delphi and C++Builder VCL BMP file processing buffer overflow
http://www.kb.cert.org/vuls/id/646748
2014年9月11日木曜日
11日 木曜日、先勝
+ RHSA-2014:1172 Important: procmail security update
https://rhn.redhat.com/errata/RHSA-2014-1172.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618
+ RHSA-2014:1172 Important: procmail security update
https://access.redhat.com/errata/RHSA-2014:1172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618
+ CESA-2014:1172 Important CentOS 7 procmail Security Update
http://lwn.net/Alerts/611424/
+ CESA-2014:1172 Important CentOS 6 procmail Security Update
http://lwn.net/Alerts/611422/
+ CESA-2014:1172 Important CentOS 5 procmail Security Update
http://lwn.net/Alerts/611423/
+ CESA-2014:1167 Important CentOS 6 kernel Security Update
http://lwn.net/Alerts/611421/
+ Thunderbird 31.1.1 released
https://www.mozilla.org/en-US/thunderbird/31.1.1/releasenotes/
+ UPDATE: HPSBGN03099 rev.2 - HP IceWall SSO Dfw, SSO Agent and MCRP running OpenSSL, Remote Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04424322-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ curl and libcurl 7.38.0 released
http://curl.haxx.se/changes.html#7_38_0
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620
+ Apache Tomcat Bug Lets Remote Users Upload and Execute Arbitrary Code in Certain Cases
http://www.securitytracker.com/id/1030834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
+ Apache Tomcat 7.0.39 Remote Code Execution
http://cxsecurity.com/issue/WLB-2014090051
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
+ SA61026 cURL / libcURL Cookie Handling Two Security Issues
http://secunia.com/advisories/61026/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620
+ Linux Kernel 'netdevice.h' NULL Pointer Dereference Denial of Service Vulnerability
http://www.securityfocus.com/bid/69721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3535
+ Linux Kernel CVE-2014-0205 Local Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/69725
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0205
+ Squid 'snmpHandleUdp()' Function Off-By-One Heap Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/69686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270
+ Apache Tomcat CVE-2013-4444 Arbitrary File Upload Vulnerability
http://www.securityfocus.com/bid/69728
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
JVNVU#98509080 UEFI EDK2 の Capsule Update 処理に複数の脆弱性
http://jvn.jp/vu/JVNVU98509080/
News & Trend
[続報]ベネッセの再発防止策は正攻法か、奇策か
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/091000052/?ST=security
ベネッセ漏洩対象は国内総人口4割の4800万人、各世帯に500円金券を配布
http://itpro.nikkeibp.co.jp/atcl/news/14/091000822/?ST=security
ベネッセとラックが合弁会社設立へ、事件受け「世界有数の体制目指す」
http://itpro.nikkeibp.co.jp/atcl/news/14/091000821/?ST=security
データベース管理者の1割は「情報を売るかもしれない」
http://itpro.nikkeibp.co.jp/atcl/news/14/091000820/?ST=security
情報漏えいをエージェントレスで監視する小型装置、コムスクエアの特定用途向け第4弾
http://itpro.nikkeibp.co.jp/atcl/news/14/091000817/?ST=security
IEに37件の脆弱性、1件についてはゼロデイ攻撃を確認
http://itpro.nikkeibp.co.jp/atcl/news/14/091000816/?ST=security
VU#241508 CacheGuard OS contains a cross-site request forgery vulnerability
http://www.kb.cert.org/vuls/id/241508
https://rhn.redhat.com/errata/RHSA-2014-1172.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618
+ RHSA-2014:1172 Important: procmail security update
https://access.redhat.com/errata/RHSA-2014:1172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618
+ CESA-2014:1172 Important CentOS 7 procmail Security Update
http://lwn.net/Alerts/611424/
+ CESA-2014:1172 Important CentOS 6 procmail Security Update
http://lwn.net/Alerts/611422/
+ CESA-2014:1172 Important CentOS 5 procmail Security Update
http://lwn.net/Alerts/611423/
+ CESA-2014:1167 Important CentOS 6 kernel Security Update
http://lwn.net/Alerts/611421/
+ Thunderbird 31.1.1 released
https://www.mozilla.org/en-US/thunderbird/31.1.1/releasenotes/
+ UPDATE: HPSBGN03099 rev.2 - HP IceWall SSO Dfw, SSO Agent and MCRP running OpenSSL, Remote Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04424322-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ curl and libcurl 7.38.0 released
http://curl.haxx.se/changes.html#7_38_0
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620
+ Apache Tomcat Bug Lets Remote Users Upload and Execute Arbitrary Code in Certain Cases
http://www.securitytracker.com/id/1030834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
+ Apache Tomcat 7.0.39 Remote Code Execution
http://cxsecurity.com/issue/WLB-2014090051
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
+ SA61026 cURL / libcURL Cookie Handling Two Security Issues
http://secunia.com/advisories/61026/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620
+ Linux Kernel 'netdevice.h' NULL Pointer Dereference Denial of Service Vulnerability
http://www.securityfocus.com/bid/69721
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3535
+ Linux Kernel CVE-2014-0205 Local Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/69725
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0205
+ Squid 'snmpHandleUdp()' Function Off-By-One Heap Buffer Overflow Vulnerability
http://www.securityfocus.com/bid/69686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270
+ Apache Tomcat CVE-2013-4444 Arbitrary File Upload Vulnerability
http://www.securityfocus.com/bid/69728
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4444
JVNVU#98509080 UEFI EDK2 の Capsule Update 処理に複数の脆弱性
http://jvn.jp/vu/JVNVU98509080/
News & Trend
[続報]ベネッセの再発防止策は正攻法か、奇策か
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/091000052/?ST=security
ベネッセ漏洩対象は国内総人口4割の4800万人、各世帯に500円金券を配布
http://itpro.nikkeibp.co.jp/atcl/news/14/091000822/?ST=security
ベネッセとラックが合弁会社設立へ、事件受け「世界有数の体制目指す」
http://itpro.nikkeibp.co.jp/atcl/news/14/091000821/?ST=security
データベース管理者の1割は「情報を売るかもしれない」
http://itpro.nikkeibp.co.jp/atcl/news/14/091000820/?ST=security
情報漏えいをエージェントレスで監視する小型装置、コムスクエアの特定用途向け第4弾
http://itpro.nikkeibp.co.jp/atcl/news/14/091000817/?ST=security
IEに37件の脆弱性、1件についてはゼロデイ攻撃を確認
http://itpro.nikkeibp.co.jp/atcl/news/14/091000816/?ST=security
VU#241508 CacheGuard OS contains a cross-site request forgery vulnerability
http://www.kb.cert.org/vuls/id/241508
2014年9月10日水曜日
10日 水曜日、赤口
+ 2014 年 9 月のマイクロソフト セキュリティ情報の概要
https://technet.microsoft.com/ja-jp/library/security/ms14-sep
+ MS14-052 - 緊急 Internet Explorer 用の累積的なセキュリティ更新プログラム (2977629)
https://technet.microsoft.com/library/security/MS14-052
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7331
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4084
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4111
+ MS14-053 - 重要 .NET Framework の脆弱性により、サービス拒否が起こる (2990931)
https://technet.microsoft.com/library/security/MS14-053
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4072
+ MS14-054 - 重要 Windows タスク スケジューラの脆弱性により、特権が昇格される (2988948)
https://technet.microsoft.com/library/security/MS14-054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4074
+ MS14-055 - 重要 Microsoft Lync Server の脆弱性により、サービス拒否が起こる (2990928)
https://technet.microsoft.com/library/security/MS14-055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4070
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4071
+ UPDATE: マイクロソフト セキュリティ アドバイザリ 2905247 ASP.NET のサイト構成が安全ではないため、特権が昇格される
https://technet.microsoft.com/ja-jp/library/security/2905247
+ UPDATE: マイクロソフト セキュリティ アドバイザリ 2871997 資格情報の保護と管理を改善する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/2871997
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/2755801
+ RHSA-2014:1167 Important: kernel security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1167.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3535
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
+ APSB14-21 Security updates available for Adobe Flash Player
http://helpx.adobe.com/security/products/flash-player/apsb14-21.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0551
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0552
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0554
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0559
+ UPDATE: APSB14-20 Prenotification Security Advisory for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
+ CESA-2014:1166 Important CentOS 7 jakarta-commons-httpclient Security Update
http://lwn.net/Alerts/611321/
+ CESA-2014:1166 Important CentOS 6 jakarta-commons-httpclient Security Update
http://lwn.net/Alerts/611320/
+ CESA-2014:1166 Important CentOS 5 jakarta-commons-httpclient Security Update
http://lwn.net/Alerts/611319/
+ HPSBMU03075 rev.1 - HP Network Node Manager I (NNMi) for Windows and Linux, Remote Execution of Arbitrary Code
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04378450-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2624
+ HPSBST03106 rev.1 - HP P2000 G3 MSA Array System running OpenSSL, Remote Unauthorized Access or Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04438404-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ HPSBUX03102 SSRT101681 rev.1 - HP-UX Apache Server Suite running Apache Tomcat or PHP, Remote Execution of Arbitrary Code and Denial of Service (DoS) and Other Vulnerabilities
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04223376-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
+ VMSA-2014-0008 VMware vSphere product updates to third party libraries
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
+ FreeBSD-SA-14:18.openssl OpenSSL multiple vulnerabilities
http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
+ SA60988 Google Chrome Multiple Vulnerabilities
http://secunia.com/advisories/60988/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0551
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0552
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0554
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3179
Introducing Open PostgreSQL Monitoring (OPM)
http://www.postgresql.org/about/news/1542/
JVNDB-2014-000104 Movable Type におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000104.html
REMOTE: ManageEngine Desktop Central StatusUpdate Arbitrary File Upload
http://www.exploit-db.com/exploits/34594
REMOTE: ALCASAR 2.8 Remote Root Code Execution Vulnerability
http://www.exploit-db.com/exploits/34595
DoS/PoC: PHP Stock Management System 1.02 - Multiple Vulnerabilty
http://www.exploit-db.com/exploits/34588
https://technet.microsoft.com/ja-jp/library/security/ms14-sep
+ MS14-052 - 緊急 Internet Explorer 用の累積的なセキュリティ更新プログラム (2977629)
https://technet.microsoft.com/library/security/MS14-052
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7331
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4084
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4111
+ MS14-053 - 重要 .NET Framework の脆弱性により、サービス拒否が起こる (2990931)
https://technet.microsoft.com/library/security/MS14-053
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4072
+ MS14-054 - 重要 Windows タスク スケジューラの脆弱性により、特権が昇格される (2988948)
https://technet.microsoft.com/library/security/MS14-054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4074
+ MS14-055 - 重要 Microsoft Lync Server の脆弱性により、サービス拒否が起こる (2990928)
https://technet.microsoft.com/library/security/MS14-055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4070
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4071
+ UPDATE: マイクロソフト セキュリティ アドバイザリ 2905247 ASP.NET のサイト構成が安全ではないため、特権が昇格される
https://technet.microsoft.com/ja-jp/library/security/2905247
+ UPDATE: マイクロソフト セキュリティ アドバイザリ 2871997 資格情報の保護と管理を改善する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/2871997
+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/2755801
+ RHSA-2014:1167 Important: kernel security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1167.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3535
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
+ APSB14-21 Security updates available for Adobe Flash Player
http://helpx.adobe.com/security/products/flash-player/apsb14-21.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0551
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0552
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0554
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0559
+ UPDATE: APSB14-20 Prenotification Security Advisory for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
+ CESA-2014:1166 Important CentOS 7 jakarta-commons-httpclient Security Update
http://lwn.net/Alerts/611321/
+ CESA-2014:1166 Important CentOS 6 jakarta-commons-httpclient Security Update
http://lwn.net/Alerts/611320/
+ CESA-2014:1166 Important CentOS 5 jakarta-commons-httpclient Security Update
http://lwn.net/Alerts/611319/
+ HPSBMU03075 rev.1 - HP Network Node Manager I (NNMi) for Windows and Linux, Remote Execution of Arbitrary Code
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04378450-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2624
+ HPSBST03106 rev.1 - HP P2000 G3 MSA Array System running OpenSSL, Remote Unauthorized Access or Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04438404-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ HPSBUX03102 SSRT101681 rev.1 - HP-UX Apache Server Suite running Apache Tomcat or PHP, Remote Execution of Arbitrary Code and Denial of Service (DoS) and Other Vulnerabilities
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04223376-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
+ VMSA-2014-0008 VMware vSphere product updates to third party libraries
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
+ FreeBSD-SA-14:18.openssl OpenSSL multiple vulnerabilities
http://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
+ SA60988 Google Chrome Multiple Vulnerabilities
http://secunia.com/advisories/60988/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0551
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0552
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0554
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3179
Introducing Open PostgreSQL Monitoring (OPM)
http://www.postgresql.org/about/news/1542/
JVNDB-2014-000104 Movable Type におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000104.html
REMOTE: ManageEngine Desktop Central StatusUpdate Arbitrary File Upload
http://www.exploit-db.com/exploits/34594
REMOTE: ALCASAR 2.8 Remote Root Code Execution Vulnerability
http://www.exploit-db.com/exploits/34595
DoS/PoC: PHP Stock Management System 1.02 - Multiple Vulnerabilty
http://www.exploit-db.com/exploits/34588
2014年9月9日火曜日
9日 火曜日、大安
+ RHSA-2014:1166 Important: jakarta-commons-httpclient security update
https://rhn.redhat.com/errata/RHSA-2014-1166.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577
+ RHSA-2014:1166 Important: jakarta-commons-httpclient security update
https://access.redhat.com/errata/RHSA-2014:1166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577
+ RHSA-2014:1144 Critical: firefox security update
https://access.redhat.com/errata/RHSA-2014:1144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ Cisco Unified Computing System E-Series Blade Servers Cisco Integrated Management Controller SSH Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140908-ucse
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3348
+ Java SE 8u20 released
http://www.oracle.com/technetwork/java/javase/8u20-relnotes-2257729.html
+ Samba 4.1.12 Available for Download
http://samba.org/samba/history/samba-4.1.12.html
+ Cisco Unified Computing System E-Series Blade Servers SSH Processing Flaw Lets Remote Users Deny Service
http://www.securitytracker.com/id/1030813
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3348
UPDATE: JVNVU#98509080 UEFI EDK2 の Capsule Update 処理に複数の脆弱性
http://jvn.jp/vu/JVNVU98509080/
セレブのヌード画像の偽リンク、ニュージーランドで大規模ネット障害
http://itpro.nikkeibp.co.jp/atcl/news/14/090800765/?ST=security
セレブの画像が流出した「iCloud」、Appleがセキュリティ強化へ
http://itpro.nikkeibp.co.jp/atcl/news/14/090800759/?ST=security
VU#396212 Netgear ProSafe Plus Configuration Utility writes out plaintext passwords to backup configuration files
http://www.kb.cert.org/vuls/id/396212
2014年9月8日月曜日
8日 月曜日、仏滅
+ HPSBST03106 rev.1 - HP P2000 G3 MSA Array System running OpenSSL, Remote Unauthorized Access or Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04438404-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ HPSBUX03102 SSRT101681 rev.1 - HP-UX Apache Server Suite running Apache Tomcat or PHP, Remote Execution of Arbitrary Code and Denial of Service (DoS) and Other Vulnerabilities
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04223376-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
+ Linux kernel 3.16.2, 3.14.18, 3.12.28, 3.10.54 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.18
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.28
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.54
+ glibc 2.20 released
https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
+ Microsoft Office 2010 registers command lines with unquoted pathnames
http://cxsecurity.com/issue/WLB-2014090026
+ Microsoft Windows perfect forward secrecy
http://cxsecurity.com/issue/WLB-2014090027
JVNVU#90369988 複数の Android アプリに SSL 証明書を適切に検証しない脆弱性
http://jvn.jp/vu/JVNVU90369988/
JVNVU#95304841 Arris 製ケーブルモデム Touchstone DG950A に情報漏えいの脆弱性
http://jvn.jp/vu/JVNVU95304841/
JVNVU#90686659 Netmaster 製ケーブルモデム CBW700N における情報漏えいの脆弱性
http://jvn.jp/vu/JVNVU90686659/
News & Trend
ヌード写真流出は対岸の火事ではない、iCloud事件の教訓
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/090400047/?ST=security
【週末スペシャル】
セキュリティは「守る」から「被害を抑える」へ、CSIRTの構築が急務
http://itpro.nikkeibp.co.jp/atcl/column/14/255608/090300013/?ST=security
ITpro NOW
お披露目がなくなったウイルス対策ソフト
http://itpro.nikkeibp.co.jp/atcl/column/14/560135/090400038/?ST=security
2014年9月5日金曜日
5日 金曜日、先勝
+ 2014 年 9 月のマイクロソフト セキュリティ情報事前通知
https://technet.microsoft.com/ja-jp/library/security/ms14-sep
+ CESA-2014:1144 Critical CentOS 5 firefox Security Update
http://lwn.net/Alerts/610730/
+ CESA-2014:1143 Moderate CentOS 5 kernel Security Update
http://lwn.net/Alerts/610732/
+ CESA-2014:1148 Important CentOS 5 squid Security Update
http://lwn.net/Alerts/610734/
+ CESA-2014:1145 Important CentOS 5 thunderbird Security Update
http://lwn.net/Alerts/610737/
+ CESA-2014:1144 Critical CentOS 7 xulrunner Security Update
http://lwn.net/Alerts/610727/
+ CESA-2014:1144 Critical CentOS 7 firefox Security Update
http://lwn.net/Alerts/610728/
+ CESA-2014:1144 Critical CentOS 6 firefox Security Update
http://lwn.net/Alerts/610729/
+ CESA-2014:1146 Important CentOS 7 httpcomponents-client Security Update
http://lwn.net/Alerts/610731/
+ CESA-2014:1148 Important CentOS 6 squid Security Update
http://lwn.net/Alerts/610733/
+ CESA-2014:1147 Important CentOS 7 squid Security Update
http://lwn.net/Alerts/610735/
+ CESA-2014:1145 Important CentOS 6 thunderbird Security Update
http://lwn.net/Alerts/610736/
+ Apache Tomcat 8.0.12 Released
http://tomcat.apache.org/tomcat-8.0-doc/changelog.html
+ APSB14-20 Prenotification Security Advisory for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
+ Sysstat 11.0.1 released
http://sebastien.godard.pagesperso-orange.fr/
+ Mozilla Firefox Secret Leak PoC
http://cxsecurity.com/issue/WLB-2014090017
+ Microsoft September 2014 Advance Notification Multiple Vulnerabilities
http://www.securityfocus.com/bid/69636
JVNDB-2014-000084 WisePoint におけるセッション固定の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000084.html
JVNDB-2014-000103 EmFTP における実行ファイル読み込みに関する脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000103.html
JVNVU#90369988 複数の Android アプリに SSL 証明書を適切に検証しない脆弱性
http://jvn.jp/vu/JVNVU90369988/
「セレブ画像に釣られるな!」――流出事件に便乗する詐欺に注意
http://itpro.nikkeibp.co.jp/atcl/news/14/090400729/?ST=security
VU#855836 Arris Touchstone cable modem information leakage vulnerabiliity
http://www.kb.cert.org/vuls/id/855836
VU#259548 Netmaster cable modem information leakage vulnerability
http://www.kb.cert.org/vuls/id/259548
https://technet.microsoft.com/ja-jp/library/security/ms14-sep
http://lwn.net/Alerts/610730/
+ CESA-2014:1143 Moderate CentOS 5 kernel Security Update
http://lwn.net/Alerts/610732/
+ CESA-2014:1148 Important CentOS 5 squid Security Update
http://lwn.net/Alerts/610734/
+ CESA-2014:1145 Important CentOS 5 thunderbird Security Update
http://lwn.net/Alerts/610737/
+ CESA-2014:1144 Critical CentOS 7 xulrunner Security Update
http://lwn.net/Alerts/610727/
+ CESA-2014:1144 Critical CentOS 7 firefox Security Update
http://lwn.net/Alerts/610728/
+ CESA-2014:1144 Critical CentOS 6 firefox Security Update
http://lwn.net/Alerts/610729/
+ CESA-2014:1146 Important CentOS 7 httpcomponents-client Security Update
http://lwn.net/Alerts/610731/
+ CESA-2014:1148 Important CentOS 6 squid Security Update
http://lwn.net/Alerts/610733/
+ CESA-2014:1147 Important CentOS 7 squid Security Update
http://lwn.net/Alerts/610735/
+ CESA-2014:1145 Important CentOS 6 thunderbird Security Update
http://lwn.net/Alerts/610736/
+ Apache Tomcat 8.0.12 Released
http://tomcat.apache.org/tomcat-8.0-doc/changelog.html
+ APSB14-20 Prenotification Security Advisory for Adobe Reader and Acrobat
http://helpx.adobe.com/security/products/reader/apsb14-20.html
+ Sysstat 11.0.1 released
http://sebastien.godard.pagesperso-orange.fr/
+ Mozilla Firefox Secret Leak PoC
http://cxsecurity.com/issue/WLB-2014090017
+ Microsoft September 2014 Advance Notification Multiple Vulnerabilities
http://www.securityfocus.com/bid/69636
JVNDB-2014-000084 WisePoint におけるセッション固定の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000084.html
JVNDB-2014-000103 EmFTP における実行ファイル読み込みに関する脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000103.html
JVNVU#90369988 複数の Android アプリに SSL 証明書を適切に検証しない脆弱性
http://jvn.jp/vu/JVNVU90369988/
「セレブ画像に釣られるな!」――流出事件に便乗する詐欺に注意
http://itpro.nikkeibp.co.jp/atcl/news/14/090400729/?ST=security
VU#855836 Arris Touchstone cable modem information leakage vulnerabiliity
http://www.kb.cert.org/vuls/id/855836
VU#259548 Netmaster cable modem information leakage vulnerability
http://www.kb.cert.org/vuls/id/259548
2014年9月4日木曜日
4日 木曜日、赤口
+ RHSA-2014:1144 Critical: firefox security update
https://rhn.redhat.com/errata/RHSA-2014-1144.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ RHSA-2014:1148 Important: squid security update
https://rhn.redhat.com/errata/RHSA-2014-1148.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609
+ RHSA-2014:1143 Moderate: kernel security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1143.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
+ RHSA-2014:1145 Important: thunderbird security update
https://rhn.redhat.com/errata/RHSA-2014-1145.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ RHSA-2014:1144 Critical: firefox security update
https://rhn.redhat.com/errata/RHSA-2014-1144.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ RHSA-2014:1146 Important: httpcomponents-client security update
https://access.redhat.com/errata/RHSA-2014:1146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577
+ RHSA-2014:1147 Important: squid security update
https://access.redhat.com/errata/RHSA-2014:1147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609
+ HPSBGN03099 rev.1 - HP IceWall SSO Dfw, SSO Agent and MCRP running OpenSSL, Remote Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04424322-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
+ UPDATE: HPSBMU03083 rev.2 - HP BladeSystem c-Class Virtual Connect Firmware running OpenSSL, Remote Unauthorized Access or Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04392919-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: HPSBST03004 rev.3 - HP IBRIX X9320 Storage running OpenSSL, Remote Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04264595-3%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ VU#582497 Multiple Android applications fail to properly validate SSL certificates
http://www.kb.cert.org/vuls/id/582497
+ Android Browser Same Origin Policy Bypass
http://cxsecurity.com/issue/WLB-2014090009
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041
+ Facebook Messenger / App MIME Sniffing Cross Site Scripting
http://cxsecurity.com/issue/WLB-2014090005
+ SA60788 Net-SNMP snmptrapd Multiple Denial of Service Vulnerabilities
http://secunia.com/advisories/60788/
+ Linux Kernel CVE-2014-5045 Local Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/68862
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045
世界のセキュリティ・ラボから
国家レベルの標的型攻撃、製薬業界に照準
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/090100009/?ST=security
危なすぎる数字だけのパスワード、JALとANAがユーザー認証を強化
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/090100042/?ST=security
トレンドマイクロ、ウイルスバスター最新版で脆弱性チェック機能を搭載
パスワード管理ツール「パスワードマネージャー 無料版」を同梱
http://itpro.nikkeibp.co.jp/atcl/news/14/090300710/?ST=security
「内部に攻撃者がいる前提で対策を」、トーマツが提言
http://itpro.nikkeibp.co.jp/atcl/news/14/090300704/?ST=security
A10、DDoS対策ハードウエアをNAT装置や負荷分散装置に順次搭載
http://itpro.nikkeibp.co.jp/atcl/news/14/090300694/?ST=security
Apple、アカウントハッキングは確認するもiCloudシステムの侵害は否定
http://itpro.nikkeibp.co.jp/atcl/news/14/090300684/?ST=security
https://rhn.redhat.com/errata/RHSA-2014-1144.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ RHSA-2014:1148 Important: squid security update
https://rhn.redhat.com/errata/RHSA-2014-1148.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609
+ RHSA-2014:1143 Moderate: kernel security and bug fix update
https://rhn.redhat.com/errata/RHSA-2014-1143.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
+ RHSA-2014:1145 Important: thunderbird security update
https://rhn.redhat.com/errata/RHSA-2014-1145.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ RHSA-2014:1144 Critical: firefox security update
https://rhn.redhat.com/errata/RHSA-2014-1144.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ RHSA-2014:1146 Important: httpcomponents-client security update
https://access.redhat.com/errata/RHSA-2014:1146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577
+ RHSA-2014:1147 Important: squid security update
https://access.redhat.com/errata/RHSA-2014:1147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609
+ HPSBGN03099 rev.1 - HP IceWall SSO Dfw, SSO Agent and MCRP running OpenSSL, Remote Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04424322-1%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
+ UPDATE: HPSBMU03083 rev.2 - HP BladeSystem c-Class Virtual Connect Firmware running OpenSSL, Remote Unauthorized Access or Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04392919-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: HPSBST03004 rev.3 - HP IBRIX X9320 Storage running OpenSSL, Remote Disclosure of Information
https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04264595-3%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ VU#582497 Multiple Android applications fail to properly validate SSL certificates
http://www.kb.cert.org/vuls/id/582497
+ Android Browser Same Origin Policy Bypass
http://cxsecurity.com/issue/WLB-2014090009
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041
+ Facebook Messenger / App MIME Sniffing Cross Site Scripting
http://cxsecurity.com/issue/WLB-2014090005
+ SA60788 Net-SNMP snmptrapd Multiple Denial of Service Vulnerabilities
http://secunia.com/advisories/60788/
+ Linux Kernel CVE-2014-5045 Local Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/68862
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045
世界のセキュリティ・ラボから
国家レベルの標的型攻撃、製薬業界に照準
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/090100009/?ST=security
危なすぎる数字だけのパスワード、JALとANAがユーザー認証を強化
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/090100042/?ST=security
トレンドマイクロ、ウイルスバスター最新版で脆弱性チェック機能を搭載
パスワード管理ツール「パスワードマネージャー 無料版」を同梱
http://itpro.nikkeibp.co.jp/atcl/news/14/090300710/?ST=security
「内部に攻撃者がいる前提で対策を」、トーマツが提言
http://itpro.nikkeibp.co.jp/atcl/news/14/090300704/?ST=security
A10、DDoS対策ハードウエアをNAT装置や負荷分散装置に順次搭載
http://itpro.nikkeibp.co.jp/atcl/news/14/090300694/?ST=security
Apple、アカウントハッキングは確認するもiCloudシステムの侵害は否定
http://itpro.nikkeibp.co.jp/atcl/news/14/090300684/?ST=security
2014年9月3日水曜日
3日 水曜日、大安
+ Google Chrome 37.0.2062.103 released
http://googlechromereleases.blogspot.jp/2014/09/stable-channel-update.html
+ Mozilla Firefox 32.0 released
https://www.mozilla.org/en-US/firefox/32.0/releasenotes/
+ Mozilla Thunderbird 31.1.0 released
https://www.mozilla.org/en-US/thunderbird/31.1.0/releasenotes/
+ MFSA 2014-72 Use-after-free setting text directionality
https://www.mozilla.org/security/announce/2014/mfsa2014-72.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ MFSA 2014-71 Profile directory file access through file: protocol
https://www.mozilla.org/security/announce/2014/mfsa2014-71.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566
+ MFSA 2014-70 Out-of-bounds read in Web Audio audio timeline
https://www.mozilla.org/security/announce/2014/mfsa2014-70.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565
+ MFSA 2014-69 Uninitialized memory use during GIF rendering
https://www.mozilla.org/security/announce/2014/mfsa2014-69.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564
+ MFSA 2014-68 Use-after-free during DOM interactions with SVG
https://www.mozilla.org/security/announce/2014/mfsa2014-68.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563
+ MFSA 2014-67 Miscellaneous memory safety hazards (rv:32.0 / rv:31.1 / rv:24.8)
https://www.mozilla.org/security/announce/2014/mfsa2014-67.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554
+ Opera 24 released
http://www.opera.com/docs/changelogs/unified/2400/
+ CESA-2014:1110 Important CentOS 7 glibc Security Update
http://lwn.net/Alerts/610342/
+ CESA-2014:1110 Important CentOS 6 glibc Update
http://lwn.net/Alerts/610340/
+ CESA-2014:1110 Important CentOS 5 glibc Update
http://lwn.net/Alerts/610341/
+ Apache HTTP Server 2.2.29 Released
http://www.apache.org/dist/httpd/Announcement2.2.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
+ Net-snmp SNMP Trap Processing Flaw Lets Remote Users Crash snmptrapd
http://www.securitytracker.com/id/1030789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565
+ net-snmp snmptrapd crash
http://cxsecurity.com/issue/WLB-2014090004
+ SA60265 Opera Multiple Vulnerabilities
http://secunia.com/advisories/60265/
「ソーシャル新人類」の不夜城?10代は何を考えているのか
不満のはけ口として他人を攻撃、「炎上事件」をたきつける心の裏
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/082800006/?ST=security
やり取り型攻撃の全貌
攻撃者の手口を踏まえた防御策、被害最小化のため準備を徹底
http://itpro.nikkeibp.co.jp/atcl/column/14/082700049/082700003/?ST=security
バラクーダ、メールセキュリティゲートウエイをAWSで提供開始
http://itpro.nikkeibp.co.jp/atcl/news/14/090200666/?ST=security
ベネズエラからLINEアカウントにログインされて、セキュリティの心構えを改めて考えた
http://itpro.nikkeibp.co.jp/atcl/column/14/560135/090200035/?ST=security
大手企業をかたる「非公認アプリ」に注意、アカウントを乗っ取られる恐れ
http://itpro.nikkeibp.co.jp/atcl/news/14/090200663/?ST=security
「iCloud」にハッキング攻撃か、セレブのプライベート画像が多数流出
http://itpro.nikkeibp.co.jp/atcl/news/14/090200662/?ST=security
http://googlechromereleases.blogspot.jp/2014/09/stable-channel-update.html
+ Mozilla Firefox 32.0 released
https://www.mozilla.org/en-US/firefox/32.0/releasenotes/
+ Mozilla Thunderbird 31.1.0 released
https://www.mozilla.org/en-US/thunderbird/31.1.0/releasenotes/
+ MFSA 2014-72 Use-after-free setting text directionality
https://www.mozilla.org/security/announce/2014/mfsa2014-72.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567
+ MFSA 2014-71 Profile directory file access through file: protocol
https://www.mozilla.org/security/announce/2014/mfsa2014-71.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1566
+ MFSA 2014-70 Out-of-bounds read in Web Audio audio timeline
https://www.mozilla.org/security/announce/2014/mfsa2014-70.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565
+ MFSA 2014-69 Uninitialized memory use during GIF rendering
https://www.mozilla.org/security/announce/2014/mfsa2014-69.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564
+ MFSA 2014-68 Use-after-free during DOM interactions with SVG
https://www.mozilla.org/security/announce/2014/mfsa2014-68.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563
+ MFSA 2014-67 Miscellaneous memory safety hazards (rv:32.0 / rv:31.1 / rv:24.8)
https://www.mozilla.org/security/announce/2014/mfsa2014-67.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554
+ Opera 24 released
http://www.opera.com/docs/changelogs/unified/2400/
+ CESA-2014:1110 Important CentOS 7 glibc Security Update
http://lwn.net/Alerts/610342/
+ CESA-2014:1110 Important CentOS 6 glibc Update
http://lwn.net/Alerts/610340/
+ CESA-2014:1110 Important CentOS 5 glibc Update
http://lwn.net/Alerts/610341/
+ Apache HTTP Server 2.2.29 Released
http://www.apache.org/dist/httpd/Announcement2.2.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
+ Net-snmp SNMP Trap Processing Flaw Lets Remote Users Crash snmptrapd
http://www.securitytracker.com/id/1030789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565
+ net-snmp snmptrapd crash
http://cxsecurity.com/issue/WLB-2014090004
+ SA60265 Opera Multiple Vulnerabilities
http://secunia.com/advisories/60265/
「ソーシャル新人類」の不夜城?10代は何を考えているのか
不満のはけ口として他人を攻撃、「炎上事件」をたきつける心の裏
http://itpro.nikkeibp.co.jp/atcl/column/14/537662/082800006/?ST=security
やり取り型攻撃の全貌
攻撃者の手口を踏まえた防御策、被害最小化のため準備を徹底
http://itpro.nikkeibp.co.jp/atcl/column/14/082700049/082700003/?ST=security
バラクーダ、メールセキュリティゲートウエイをAWSで提供開始
http://itpro.nikkeibp.co.jp/atcl/news/14/090200666/?ST=security
ベネズエラからLINEアカウントにログインされて、セキュリティの心構えを改めて考えた
http://itpro.nikkeibp.co.jp/atcl/column/14/560135/090200035/?ST=security
大手企業をかたる「非公認アプリ」に注意、アカウントを乗っ取られる恐れ
http://itpro.nikkeibp.co.jp/atcl/news/14/090200663/?ST=security
「iCloud」にハッキング攻撃か、セレブのプライベート画像が多数流出
http://itpro.nikkeibp.co.jp/atcl/news/14/090200662/?ST=security
2014年9月2日火曜日
2日 火曜日、仏滅
+ UPDATE: HPSBMU03083 rev.2 - HP BladeSystem c-Class Virtual Connect Firmware running OpenSSL, Remote Unauthorized Access or Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04392919-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: HPSBST03004 rev.3 - HP IBRIX X9320 Storage running OpenSSL, Remote Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04264595-3%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
やり取り型攻撃の全貌
組織の窓口狙い多重攻撃、相手の反応を読み手口を巧妙化
http://itpro.nikkeibp.co.jp/atcl/column/14/082700049/082700002/?ST=security
古いガラケーなどがSSL接続不能に?着実に迫る「SHA-2証明書」移行問題
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/083100041/?ST=security
ブイキューブが法人向け無料メッセンジャー開始、ユーザーやログを一元管理
http://itpro.nikkeibp.co.jp/atcl/news/14/090100656/?ST=security
大手企業の1割以上が「CSIRT/SOCを設立済み」、「設立予定」は4分の1
http://itpro.nikkeibp.co.jp/atcl/news/14/090100655/?ST=security
富士通エフサスがWindows画面録画ソフト「ESS REC」を発売、富士通グループで初
http://itpro.nikkeibp.co.jp/atcl/news/14/090100649/?ST=security
REMOTE: Wing FTP Server Authenticated Command Execution
http://www.exploit-db.com/exploits/34517
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04392919-2%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
+ UPDATE: HPSBST03004 rev.3 - HP IBRIX X9320 Storage running OpenSSL, Remote Disclosure of Information
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04264595-3%257CdocLocale%253Dja_JP%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
やり取り型攻撃の全貌
組織の窓口狙い多重攻撃、相手の反応を読み手口を巧妙化
http://itpro.nikkeibp.co.jp/atcl/column/14/082700049/082700002/?ST=security
古いガラケーなどがSSL接続不能に?着実に迫る「SHA-2証明書」移行問題
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/083100041/?ST=security
ブイキューブが法人向け無料メッセンジャー開始、ユーザーやログを一元管理
http://itpro.nikkeibp.co.jp/atcl/news/14/090100656/?ST=security
大手企業の1割以上が「CSIRT/SOCを設立済み」、「設立予定」は4分の1
http://itpro.nikkeibp.co.jp/atcl/news/14/090100655/?ST=security
富士通エフサスがWindows画面録画ソフト「ESS REC」を発売、富士通グループで初
http://itpro.nikkeibp.co.jp/atcl/news/14/090100649/?ST=security
REMOTE: Wing FTP Server Authenticated Command Execution
http://www.exploit-db.com/exploits/34517
2014年9月1日月曜日
1日 月曜日、先負
+ RHSA-2014:1110 Important: glibc security update
https://rhn.redhat.com/errata/RHSA-2014-1110.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ RHSA-2014:1110 Important: glibc security update
https://access.redhat.com/errata/RHSA-2014:1110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ phpMyAdmin 4.2.8 is released
http://sourceforge.net/p/phpmyadmin/news/2014/08/phpmyadmin-428-is-released/
+ Glibc Heap Overflow in __gconv_translit_find() Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1030786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ glibc Off-by-One NUL Byte gconv_translit_find Exploit
http://cxsecurity.com/issue/WLB-2014080131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ Internet Explorer MS14-029 Memory Corruption PoC
http://cxsecurity.com/issue/WLB-2014080141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1815
+ iPhone Call From LockScreen ByPass By Siri On iOS 7.1.2 (0day) *youtube
http://cxsecurity.com/issue/WLB-2014080144
+ GNU glibc 'iconv()' Denial of Service Vulnerability
http://www.securityfocus.com/bid/69472
DbWrench Database Design 3.2 Released
http://www.postgresql.org/about/news/1541/
JVNDB-2014-000102 Android 版アプリ Kindle における SSL サーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000102.html
やり取り型攻撃の全貌
担当者の警戒を緩め侵入を狙う、情報共有で見えた攻撃の全貌
http://itpro.nikkeibp.co.jp/atcl/column/14/082700049/082700001/?ST=security
「サイバー闇市場」は数千億円規模、サイバー攻撃のSaaSも用意
http://itpro.nikkeibp.co.jp/atcl/news/14/082900628/?ST=security
REMOTE: F5 Big-IP - Unauthenticated rsync Access
http://www.exploit-db.com/exploits/34465
REMOTE: NRPE 2.15 - Remote Code Execution Vulnerability
http://www.exploit-db.com/exploits/34461
DoS/PoC: HTML Help Workshop 1.4 - (SEH) Buffer Overflow
http://www.exploit-db.com/exploits/34463
https://rhn.redhat.com/errata/RHSA-2014-1110.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ RHSA-2014:1110 Important: glibc security update
https://access.redhat.com/errata/RHSA-2014:1110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ phpMyAdmin 4.2.8 is released
http://sourceforge.net/p/phpmyadmin/news/2014/08/phpmyadmin-428-is-released/
+ Glibc Heap Overflow in __gconv_translit_find() Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1030786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ glibc Off-by-One NUL Byte gconv_translit_find Exploit
http://cxsecurity.com/issue/WLB-2014080131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
+ Internet Explorer MS14-029 Memory Corruption PoC
http://cxsecurity.com/issue/WLB-2014080141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1815
+ iPhone Call From LockScreen ByPass By Siri On iOS 7.1.2 (0day) *youtube
http://cxsecurity.com/issue/WLB-2014080144
+ GNU glibc 'iconv()' Denial of Service Vulnerability
http://www.securityfocus.com/bid/69472
DbWrench Database Design 3.2 Released
http://www.postgresql.org/about/news/1541/
JVNDB-2014-000102 Android 版アプリ Kindle における SSL サーバ証明書の検証不備の脆弱性
http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000102.html
やり取り型攻撃の全貌
担当者の警戒を緩め侵入を狙う、情報共有で見えた攻撃の全貌
http://itpro.nikkeibp.co.jp/atcl/column/14/082700049/082700001/?ST=security
「サイバー闇市場」は数千億円規模、サイバー攻撃のSaaSも用意
http://itpro.nikkeibp.co.jp/atcl/news/14/082900628/?ST=security
REMOTE: F5 Big-IP - Unauthenticated rsync Access
http://www.exploit-db.com/exploits/34465
REMOTE: NRPE 2.15 - Remote Code Execution Vulnerability
http://www.exploit-db.com/exploits/34461
DoS/PoC: HTML Help Workshop 1.4 - (SEH) Buffer Overflow
http://www.exploit-db.com/exploits/34463
登録:
投稿 (Atom)