2015年3月31日火曜日

31日 火曜日、先勝









+ RHSA-2015:0750 Moderate: postgresql security update
https://rhn.redhat.com/errata/RHSA-2015-0750.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244

+ RHSA-2015:0749 Moderate: libxml2 security update
https://rhn.redhat.com/errata/RHSA-2015-0749.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191

+ UPDATE: Row Hammer Privilege Escalation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150309-rowhammer

+ HPSBGN03270 rev.1 - HP Operations Analytics, Remote Execution of Code
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04577814&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235

+ JVNVU#99234709 glibc ライブラリにバッファオーバーフローの脆弱性
http://jvn.jp/vu/JVNVU99234709/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235

+ JVNVU#98974537 OpenSSL に複数の脆弱性
http://jvn.jp/vu/JVNVU98974537/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571

+ tcpdump Multiple Memory Corruption Vulnerabilities
http://secunia.com/advisories/63716/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154

原発管理会社へのサイバー攻撃で韓国は緊張状態、韓国軍は「サイバー作戦課」を新設
http://itpro.nikkeibp.co.jp/atcl/column/14/549762/032600025/?ST=security

青天井のセキュリティ対策、どこまでするか
PART2 対策の常識が変わる
http://itpro.nikkeibp.co.jp/atcl/column/15/032600052/032600002/?ST=security

「AWS導入支援コンサルティングに注力」、Amazon日本法人が説明会
http://itpro.nikkeibp.co.jp/atcl/news/15/033001125/?ST=security

ネットエージェントがラックの子会社に、杉浦社長は引き続き経営に従事
http://itpro.nikkeibp.co.jp/atcl/news/15/033001120/?ST=security

NECがマルウエア感染端末をSDNで隔離、初動対応を自動化
http://itpro.nikkeibp.co.jp/atcl/news/15/033001118/?ST=security

福島県矢祭町がマイナンバー対応で住基ネットに接続、約13年で全自治体参加
http://itpro.nikkeibp.co.jp/atcl/news/15/033001117/?ST=security

JVNVU#92002857 複数の認証局においてメールアドレスのみに基づいて証明書を発行している問題
http://jvn.jp/vu/JVNVU92002857/index.html

LOCAL: BZR Player 1.03 - DLL Hijacking
http://www.exploit-db.com/exploits/36555/

LOCAL: ZIP Password Recovery Professional 7.1 - DLL Hijacking
http://www.exploit-db.com/exploits/36556/

LOCAL: HTTrack Website Copier 3.48-21 - DLL Hijacking
http://www.exploit-db.com/exploits/36557/

LOCAL: UltraISO 9.6.2.3059 - DLL Hijacking
http://www.exploit-db.com/exploits/36558/

LOCAL: Fedora21 setroubleshootd Local Root PoC
http://www.exploit-db.com/exploits/36564/

2015年3月30日月曜日

30日 月曜日、赤口

+ CESA-2015:0729 Important CentOS 6 setroubleshoot Security Update
http://lwn.net/Alerts/638180/

+ CESA-2015:0729 Important CentOS 5 setroubleshoot Security Update
http://lwn.net/Alerts/638181/

+ phpMyAdmin 4.3.13 released
http://sourceforge.net/p/phpmyadmin/news/2015/03/phpmyadmin-4313-release-notes/

+ squid 3.5.3 released
http://www.squid-cache.org/Versions/v3/3.5/squid-3.5.3-RELEASENOTES.html

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ UPDATE: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl

+ UPDATE: HPSBHF03276 rev.2 - HP Integrated Lights-Out 2, 3, and 4 (iLO 2, iLO 3, iLO 4), Remote Unauthorized Access, Denial of Service (Dos)
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04582368&docLocale=ja_JP

+ VU#591120 Multiple SSL certificate authorities use email addresses as proof of domain ownership
http://www.kb.cert.org/vuls/id/591120

PostgreSQL Data Sync 15.3 released
http://www.postgresql.org/about/news/1579/

JVNDB-2015-000045 Android OS がオープンリゾルバとして機能してしまう問題
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000045.html

JVNVU#91373232 ANTlabs 製 InnGate の複数のモデルにおいて認証なしでファイルシステムへの読書きが可能な脆弱性
http://jvn.jp/vu/JVNVU91373232/

JVN#81094176 Android OS がオープンリゾルバとして機能してしまう問題
http://jvn.jp/jp/JVN81094176/

チェックしておきたい脆弱性情報<2015.03.30>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/032300048/?ST=security

青天井のセキュリティ対策、どこまでするか
PART1 ドキュメント セキュリティ対策の最前線
http://itpro.nikkeibp.co.jp/atcl/column/15/032600052/032600001/?ST=security

2015年3月27日金曜日

27日 金曜日、先負











+ RHSA-2015:0729 Important: setroubleshoot security update
https://rhn.redhat.com/errata/RHSA-2015-0729.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1815

+ RHSA-2015:0728 Moderate: ipa and slapi-nis security and bug fix update
https://rhn.redhat.com/errata/RHSA-2015-0728.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0283
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1827

+ RHSA-2015:0726 Important: kernel security and bug fix update
https://rhn.redhat.com/errata/RHSA-2015-0726.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421

+ CESA-2015:0718 Critical CentOS 6 firefox Security Update
http://lwn.net/Alerts/638022/

+ CESA-2015:0718 Critical CentOS 5 firefox Security Update
http://lwn.net/Alerts/638023/

+ UPDATE: Cisco IOS Software and IOS XE Software mDNS Gateway Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns

+ UPDATE: Cisco IOS Software Virtual Routing and Forwarding ICMP Queue Wedge Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-wedge

+ UPDATE: Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150320-openssl

+ UPDATE: Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl

+ UPDATE: Multiple Vulnerabilities in ntpd Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

+ HPSBMU03294 rev.1 - HP Process Automation running OpenSSL, Remote Disclosure of Information
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04597376&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566

+ UPDATE: HPSBMU03291 rev.2 - HP Operations Orchestration running Powershell Operations, Remote Disclosure of Information
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04595417&docLocale=ja_JP

+ Linux kernel 3.19.3, 3.14.37, 3.10.73 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.37
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.73

+ PHP ZIP Library Integer Overflow Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1031985
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331

SSL/TLS (FREAK) vulnerability: affected Sophos products and versions
http://www.sophos.com/en-us/support/knowledgebase/122007.aspx

JVNDB-2015-000044 WordPress 用テーマ flashy におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000044.html

JVNDB-2015-000043 Fumy Teacher's Schedule Board におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000043.html

チェックしておきたい脆弱性情報<2015.03.27>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/032300047/?ST=security

世界のセキュリティ・ラボから
家庭内ネットワークを嗅ぎまわるマルウエア
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/032300038/?ST=security

VU#930956 Multiple ANTlabs InnGate models allow unauthenticated read/write to filesystem
http://www.kb.cert.org/vuls/id/930956

REMOTE: QNAP admin shell via Bash Environment Variable Code Injection
http://www.exploit-db.com/exploits/36503/

REMOTE: QNAP Web Server Remote Code Execution via Bash Environment Variable Code Injection
http://www.exploit-db.com/exploits/36504/

REMOTE: WebGate eDVR Manager Stack Buffer Overflow
http://www.exploit-db.com/exploits/36505/

LOCAL: Mini-stream Ripper v2.7.7.100 Local Buffer Overflow
http://www.exploit-db.com/exploits/36501/

LOCAL: RM Downloader 2.7.5.400 Local Buffer Overflow
http://www.exploit-db.com/exploits/36502/

2015年3月26日木曜日

26日 木曜日、友引

+ RHSA-2015:0265 Critical: firefox security update
https://rhn.redhat.com/errata/RHSA-2015-0265.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836

+ UPDATE: Cisco IOS Software and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerabilities
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2

+ UPDATE: Cisco IOS Software and IOS XE Software TCP Packet Memory Leak Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-tcpleak

+ UPDATE: Cisco IOS Software and IOS XE Software mDNS Gateway Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns

+ UPDATE: Multiple Vulnerabilities in Cisco IOS Software and IOS XE Software Autonomic Networking Infrastructure
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani

+ Multiple Vulnerabilities in Cisco IOS Software Common Industrial Protocol
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0647
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0648
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0649

+ Cisco IOS Software Virtual Routing and Forwarding ICMP Queue Wedge Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-wedge
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0638

+ Multiple Vulnerabilities in Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0644
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0641
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0645
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0639

+ Multiple Vulnerabilities in Cisco IOS Software Common Industrial Protocol
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0647
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0648
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0649

+ SA63563 Linux Kernel sendto / recvfrom Memory Disclosure and Privilege Escalation Vulnerabilities
http://secunia.com/advisories/63563/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2686

+ SA63394 Google Android Multiple Vulnerabilities
http://secunia.com/advisories/63394/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7912
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7914

+ REMOTE: Adobe Flash Player Arbitrary Code Execution
http://www.exploit-db.com/exploits/36491/

+ Microsoft Windows Local WebDAV NTLM Reflection Privilege Escalation
http://cxsecurity.com/issue/WLB-2015030176

Vulnerabilities in Citrix Command Center Could Result in Credential Disclosure and Host Compromise
http://support.citrix.com/article/CTX200584

Active Directoryが危ない!標的型攻撃から守れ
第4回 イベントログを精査、攻撃の痕跡を見つける
http://itpro.nikkeibp.co.jp/atcl/column/15/031700048/031700004/?ST=security

着実に忍び寄るBadUSBの脅威、「数秒でPC乗っ取り可能」の怖さにおののいた
http://itpro.nikkeibp.co.jp/atcl/watcher/14/334361/032400225/?ST=security

トレンドマイクロがOffice 365向け新サービス発表、端末OSを問わず脅威検知
http://itpro.nikkeibp.co.jp/atcl/news/15/032501077/?ST=security

チェック・ポイント、文書ファイルの“無害化”転送機能を追加
http://itpro.nikkeibp.co.jp/atcl/news/15/032501073/?ST=security

2015年3月25日水曜日

25日 水曜日、先勝

+ RHSA-2015:0718 Critical: firefox security update
https://rhn.redhat.com/errata/RHSA-2015-0718.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818

+ nginx 1.7.11 released
http://nginx.org/

+ CESA-2015:0715 Moderate CentOS 6 openssl Security Update
http://lwn.net/Alerts/637695/

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ UPDATE: SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle

+ Linux kernel 3.18.10 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.10

+ REMOTE: Firefox Proxy Prototype Privileged Javascript Injection
http://www.exploit-db.com/exploits/36480/

+ Firefox Proxy Prototype Privileged Javascript Injection
http://cxsecurity.com/issue/WLB-2015030170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636

+ Linux Kernel XSAVE / XRSTOR Fault Handling Denial of Service Vulnerability
http://secunia.com/advisories/63542/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2672

+ OpenVPN OpenSSL "ASN1_TYPE_cmp()" Denial of Service Vulnerability
http://secunia.com/advisories/63452/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286

+ Node.js OpenSSL Vulnerabilities
http://secunia.com/advisories/63600/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0208
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1787

JVNDB-2015-000042 TERASOLUNA Server Framework for Java(WEB) の Validator に入力値検査回避の脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000042.html

Active Directoryが危ない!標的型攻撃から守れ
第3回 ポイントは「アカウント管理」と「早期検知」
http://itpro.nikkeibp.co.jp/atcl/column/15/031700048/031700003/?ST=security

要件定義・基本設計で役立つ、安全なWebアプリ&インフラ構築術
第3回 Webアプリの「セッション」に潜む罠
http://itpro.nikkeibp.co.jp/atcl/column/15/021900028/031700005/?ST=security

世界のセキュリティ・ラボから
米管制システムに脆弱性、当局調査が指摘
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/032300037/?ST=security

チェックしておきたい脆弱性情報<2015.03.25>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/032300046/?ST=security

米グーグルが「Android for Work」で法人市場に本腰、iOSの牙城を崩せるか
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/032300202/?ST=security

[データは語る]国内企業の4割弱が「セキュリティの強化」を経営課題に??アイ・ティ・アール
http://itpro.nikkeibp.co.jp/atcl/news/14/110601779/032400137/?ST=security

REMOTE: Bsplayer 2.68 - HTTP Response Exploit (Universal)
http://www.exploit-db.com/exploits/36477/

2015年3月24日火曜日

24日 火曜日、赤口

+ RHSA-2015:0715 Moderate: openssl security update
https://rhn.redhat.com/errata/RHSA-2015-0715.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293

+ RHSA-2015:0716 Moderate: openssl security and bug fix update
https://rhn.redhat.com/errata/RHSA-2015-0716.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293

+ Mozilla Firefox 36.0.4 released
https://www.mozilla.org/en-US/firefox/36.0.4/releasenotes/

+ MFSA-2015-28 Privilege escalation through SVG navigation
https://www.mozilla.org/en-US/security/advisories/mfsa2015-28/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818

+ MFSA-2015-29 Code execution through incorrect JavaScript bounds checking elimination
https://www.mozilla.org/en-US/security/advisories/mfsa2015-29/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817

+ PDFCreator 2.1 and PDF Architect 3 released
http://www.pdfforge.org/blog/pdfcreator-21-and-pdf-architect-3-released

+ UPDATE: Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150320-openssl

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ PHP 5.6.7, 5.5.23, 5.4.39 released
http://php.net/ChangeLog-5.php#5.6.7
http://php.net/ChangeLog-5.php#5.5.23
http://php.net/ChangeLog-5.php#5.4.39

+ Sudo 1.8.13 released
http://www.sudo.ws/sudo/stable.html#1.8.13

+ JVNVU#95877131 OpenSSL に複数の脆弱性
http://jvn.jp/vu/JVNVU95877131/

+ Mozilla Firefox SVG Processing Flaw Lets Remote Users Bypass Same-Origin Policy and Execute Arbitrary Scripts with Elevated Privileges
http://www.securitytracker.com/id/1031959
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818

+ Mozilla Firefox Heap Overflow in JIT Implementation Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1031958
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817

+ OpenSSL DoS tester now available (CVE-2015-0291)
http://cxsecurity.com/issue/WLB-2015030160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0291

+ PHP SoapClient's __call() type confusion through unserialize()
http://cxsecurity.com/issue/WLB-2015030159

+ Mozilla Firefox / Firefox ESR / SeaMonkey Two Vulnerabilities
http://secunia.com/advisories/62437/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818

JVNDB-2015-000040 LINE における意図しないアプリ内関数が呼び出される脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000040.html

JVNDB-2015-000041 MP Form Mail CGI eCommerce版 におけるコードインジェクションの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000041.html

Active Directoryが危ない!標的型攻撃から守れ
第2回 ドメイン管理者の認証情報が狙われる
http://itpro.nikkeibp.co.jp/atcl/column/15/031700048/031700002/?ST=security

Active Directoryが危ない!標的型攻撃から守れ
第1回 メールやWeb経由で侵入、端末の乗っ取りを図る
http://itpro.nikkeibp.co.jp/atcl/column/15/031700048/031700001/?ST=security

テコラスがDB向けセキュリティソフト、アクセス中の様子を動画で確認
http://itpro.nikkeibp.co.jp/atcl/news/15/032001033/?ST=security

JVNVU#94580091 複数の BIOS 実装において SMRAM の領域外を参照する SMM 関数呼び出しが可能な問題
http://jvn.jp/vu/JVNVU94580091/

JVNVU#93435107 NSIS Inetc プラグインに SSL サーバ証明書の検証不備の脆弱性
http://jvn.jp/vu/JVNVU93435107/

JVN#41281927 LINE における意図しないアプリ内関数が呼び出される脆弱性
http://jvn.jp/jp/JVN41281927/

JVNVU#93102213 Apple OS X における複数の脆弱性に対するアップデート
http://jvn.jp/vu/JVNVU93102213/

JVNVU#99221748 Apple Safari における複数の脆弱性に対するアップデート
http://jvn.jp/vu/JVNVU99221748/index.html

JVN#39175666 MP Form Mail CGI eCommerce版 におけるコードインジェクションの脆弱性
http://jvn.jp/jp/JVN39175666/index.html

VU#631788 Multiple BIOS implementations permit unsafe SMM function calls to memory locations outside of SMRAM
http://www.kb.cert.org/vuls/id/631788

VU#894897 NSIS Inetc plug-in fails to validate SSL certificates
http://www.kb.cert.org/vuls/id/894897

2015年3月20日金曜日

20日 金曜日、友引

+ Google Chrome 41.0.2272.101 released
http://googlechromereleases.blogspot.jp/2015/03/stable-channel-update_19.html

+ CESA-2015:0696 Important CentOS 6 freetype Security Update
http://lwn.net/Alerts/637271/

+ CESA-2015:0700 Moderate CentOS 6 unzip Security Update
http://lwn.net/Alerts/637272/

+ UPDATE: Cisco Secure Access Control System SQL Injection Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150211-csacs

+ UPDATE: Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl

+ Linux kernel 3.12.39 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.39

+ OpenSSL 1.0.2a, 1.0.1m, 1.0.0r, 0.9.8zf released
http://www.openssl.org/news/openssl-1.0.2-notes.html
http://www.openssl.org/news/openssl-1.0.1-notes.html
http://www.openssl.org/news/openssl-1.0.0-notes.html
http://www.openssl.org/news/openssl-0.9.8-notes.html

+ OpenSSL Security Advisory [19 Mar 2015]
http://www.openssl.org/news/secadv_20150319.txt
http://www.openssl.org/news/vulnerabilities.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0208
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1787
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288

+ PHP Memory Handling Error in phar Extension Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1031949
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301

+ PHP Heap Overflow in ereg Extension Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1031947
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305

+ PHP DateTimeZone Use-After-Free Memory Error in unserialize() Lets Remote Users Execute Arbitrary Code
http://www.securitytracker.com/id/1031945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273

+ LOCAL: Windows 8.1 - Local WebDAV NTLM Reflection Elevation of Privilege
http://www.exploit-db.com/exploits/36424/

+ libzip "_zip_cdir_new()" Integer Overflow Vulnerability
http://secunia.com/advisories/63323/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331

「サイバー脅威に適切に対応すれば評判は落ちない」、RSAが提言
http://itpro.nikkeibp.co.jp/atcl/news/15/031901021/?ST=security

REMOTE: TWiki Debugenableplugins Remote Code Execution
http://www.exploit-db.com/exploits/36438/

LOCAL: Publish-It PUI Buffer Overflow (SEH)
http://www.exploit-db.com/exploits/36437/

DoS/PoC: FastStone Image Viewer 5.3 .tga Crash PoC
http://www.exploit-db.com/exploits/36431/

DoS/PoC: Fortinet Single Sign On Stack Overflow
http://www.exploit-db.com/exploits/36422/

2015年3月19日木曜日

Red Hat Enterprise Linux Server (v. 7.1 for x86_64) INSTALL MEMO

Red Hat Enterprise Linux Server (v. 7.1 for x86_64) がリリースされたので、トライアル版をインストールしてみた。

1. DVDからブートしてしばらくすると、「ようこそ」画面が表示される。
 「日本語」を選択して「続行」ボタンを押す。


2. 「インストールの概要」画面が表示される。


3. 「日付と時刻」画面


4. 「キーボードレイアウト」画面


5. 「言語サポート」画面


6. 「インストールソース」画面


7. 「ソフトウェアの選択」画面


8. 「インストール先」画面


9. 「KDUMP」画面


10. 「ネットワークとホスト名」画面


11. 「インストールの概要」画面に戻って、「インストールの開始」ボタンを押す。


12. インストールが進みながら、「設定」画面が表示される。


13. 「root パスワード」画面


14. 「ユーザの作成」はせずに、インストールが終了するのを待つ。


15. インストールが終了すると、「初期セットアップ」画面が表示される。


16. 「ライセンス情報」画面にて「ライセンス契約に同意します」をチェックする。


17. 「 初期セットアップ」画面に戻り、「設定の完了」ボタンを押す。


18. 「サブスクリプション管理の登録」画面が表示される。
  「いいえ、後で登録します。」を選択して、「進む」ボタンを押す。


19. 「ようこそ」画面が表示されるので、「日本語」選択して「次へ」ボタンを押す。


20. 「入力ソース」画面が表示されるので、「日本語」を選択して「次へ」ボタンを押す。


21. 「ログイン」画面が表示されるので、ローカルアカウントの作成情報を入力して「次へ」ボタンを押す。


22. 「場所」画面が表示されるので、「Tokyo」を選択して「次へ」ボタンを押す。


23. 「オンラインアカウント」画面が表示されるので、アカウントを追加せずに「次へ」ボタンを押す。


24. これで初期セットアップが終了のようで、「Start up Red Hat Enterprise Linux Server」ボタンを押す。


25. デスクトップ画面が表示される。Finder と FireFox を起動してみた。



終わりに、この後サブスクリプションの登録をすれば、1か月快適に使用できる。

19日 木曜日、大安

+ RHSA-2015:0700 Moderate: unzip security update
https://rhn.redhat.com/errata/RHSA-2015-0700.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636

+ About the security content of Safari 8.0.4, Safari 7.1.4, and Safari 6.2.4
https://support.apple.com/ja-jp/HT204560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1069
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1070
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1074
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1078
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1084

+ Linux kernel 3.19.2, 3.14.36, 3.10.72 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.2
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.36
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.72

+ OpenSSH 6.8 released
http://www.openssh.com/txt/release-6.8

+ Apple Safari Multiple WebKit Bugs Let Remote Users Execute Arbitrary Code and Spoof URLs
http://www.securitytracker.com/id/1031936

+ Linux kernel execution in the early microcode loader
http://cxsecurity.com/issue/WLB-2015030122

+ Adobe Flash Player PCRE Regex Logic Error
http://cxsecurity.com/issue/WLB-2015030119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0318

+ Moodle 2.5.9 / 2.6.8 / 2.7.5 / 2.8.3 Cross Site Scripting
http://cxsecurity.com/issue/WLB-2015030118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2269

+ PHP Multiple Vulnerabilities
http://secunia.com/advisories/63517/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331

+ Apple Safari WebKit Multiple Vulnerabilities
http://secunia.com/advisories/63432/

UPDATE: JVNVU#99125992 SSL/TLS の実装が輸出グレードの RSA 鍵を受け入れる問題 (FREAK 攻撃)
http://jvn.jp/vu/JVNVU99125992/

UPDATE: JVN#19294237 Apache Struts において ClassLoader が操作可能な脆弱性
http://jvn.jp/jp/JVN19294237/

UPDATE: JVNVU#962587 Quagga にサービス運用妨害 (DoS) の脆弱性
http://jvn.jp/vu/JVNVU962587/

UPDATE: JVNVU#555316 複数の STARTTLS 実装に脆弱性
http://jvn.jp/vu/JVNVU555316/

JVNVU#99249829 HP ArcSight アプライアンス製品に複数の脆弱性
http://jvn.jp/vu/JVNVU99249829/

REMOTE: Exim GHOST (glibc gethostbyname) Buffer Overflow
http://www.exploit-db.com/exploits/36421/

DoS/PoC: Fortinet Single Sign On Stack Overflow
http://www.exploit-db.com/exploits/36422/

2015年3月18日水曜日

18日 水曜日、仏滅

+ マイクロソフト セキュリティ アドバイザリ 3046310 不適切に発行されたデジタル証明書により、なりすましが行われる
https://technet.microsoft.com/ja-jp/library/security/3046310

+ RHSA-2015:0696 Important: freetype security update
https://rhn.redhat.com/errata/RHSA-2015-0696.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675

+ UPDATE: Row Hammer Privilege Escalation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150309-rowhammer

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ Android audio_policy app Local DoS
http://cxsecurity.com/issue/WLB-2015030111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1525

+ Intel Network Adapter Diagnostic Driver IOCTL Handling Vulnerability
http://cxsecurity.com/issue/WLB-2015030110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2291

Registration for PGConf US 2015 Closing Soon. Very Soon.
http://www.postgresql.org/about/news/1577/

PostgresOpen 2015 in Dallas - Call For Papers!
http://www.postgresql.org/about/news/1578/

JVNDB-2015-000039 eXtplorer におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000039.html

第2回 なぜ安全ではないWebアプリが出来るのか
http://itpro.nikkeibp.co.jp/atcl/column/15/021900028/031000004/?ST=security

日本でさっぱり売れない「サイバーセキュリティ保険」、普及への壁
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/031600197/?ST=security

ベネッセの顧客情報23人分流出、コールセンター委託先契約社員のスマホから発覚
http://itpro.nikkeibp.co.jp/atcl/news/15/031700977/?ST=security

2人に1人が私物端末を業務利用、グーグルがセキュリティ調査結果を発表
http://itpro.nikkeibp.co.jp/atcl/news/15/031700970/?ST=security

UPDATE: JVNVU#94401838 OpenSSL の heartbeat 拡張に情報漏えいの脆弱性
http://jvn.jp/vu/JVNVU94401838/

UPDATE: JVNVU#96176042 NTP が DDoS 攻撃の踏み台として使用される問題
http://jvn.jp/vu/JVNVU96176042/

UPDATE: JVNVU#94189582 Oracle Javadoc ツールに脆弱性
http://jvn.jp/vu/JVNVU94189582/

UPDATE: JVNVU#90348117 Portable SDK for UPnP にバッファオーバーフローの脆弱性
http://jvn.jp/vu/JVNVU90348117/

JVNVU#98312907 D-Link DAP-1320 Rev Ax に OS コマンドインジェクションの脆弱性
http://jvn.jp/vu/JVNVU98312907/

JVNVU#97897252 D-Link DCS-93xL シリーズにファイルアップロードの脆弱性
http://jvn.jp/vu/JVNVU97897252/

JVN#97099798 eXtplorer におけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN97099798/

VU#868948 HP ArcSight contains multiple vulnerabilities
http://www.kb.cert.org/vuls/id/868948

LOCAL: Spybot Search & Destroy 1.6.2 Security Center Service - Privilege Escalation
http://www.exploit-db.com/exploits/36417

2015年3月17日火曜日

17日 火曜日、先負

+ UPDATE: Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl

+ OpenSSL "hostname" TLS Extension memory leak
http://cxsecurity.com/issue/WLB-2015030097

+ Google App Engine Java security sandbox bypasses (details)
http://cxsecurity.com/issue/WLB-2015030096

LINEアプリに深刻なセキュリティ脆弱性、トーク履歴などを抜き取られる恐れ
http://itpro.nikkeibp.co.jp/atcl/news/15/031600958/?ST=security

Yahoo!、新たなログイン手法を追加、メール暗号化技術も年内実装へ
http://itpro.nikkeibp.co.jp/atcl/news/15/031600933/?ST=security

VU#184100 D-Link DAP-1320 Rev Ax is vulnerable to a command injection
http://www.kb.cert.org/vuls/id/184100

VU#377348 D-Link DCS-93xL model family allows unrestricted upload
http://www.kb.cert.org/vuls/id/377348

REMOTE: IPass Control Pipe Remote Command Execution
http://www.exploit-db.com/exploits/36412

REMOTE: ElasticSearch Search Groovy Sandbox Bypass
http://www.exploit-db.com/exploits/36415

LOCAL: Brasero CD/DVD Burner 3.4.1 - 'm3u' Buffer Overflow Crash PoC
http://www.exploit-db.com/exploits/36388

LOCAL: Foxit Reader 7.0.6.1126 - Unquoted Service Path Elevation Of Privilege
http://www.exploit-db.com/exploits/36390

DoS/PoC: WordPress SEO by Yoast 1.7.3.3 - Blind SQL Injection
http://www.exploit-db.com/exploits/36413

2015年3月16日月曜日

16日 月曜日、友引

+ CESA-2015:0674 Important CentOS 6 kernel Security Update
http://lwn.net/Alerts/636654/

+ phpMyAdmin 4.3.12 released
http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.3.12/phpMyAdmin-4.3.12-notes.html/view

+ UPDATE: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ UPDATE: Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl

+ HPSBGN03290 rev.1 - HP Propel, Remote Execution of Arbitrary Code
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04594058&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235

+ HPSBHF03293 rev.1 - HP Virtual Connect 8Gb 24-Port FC Module running OpenSSL and Bash, Remote Denial of Service (DoS), Code Execution, Disclosure of Information
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04595951&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139

+ HPSBMU03295 rev.1 - HP BladeSystem c-Class Virtual Connect Firmware running OpenSSL, Remote Disclosure of Information
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04599439&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567

+ HPSBST03298 rev.1 - HP XP Service Processor Software for Windows, Multiple Vulnerabilities
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04600552&docLocale=ja_JP

+ Adobe Flash Player Multiple Memory Corruption Flaws Let Remote Users Execute Arbitrary Code and Bypass Security Restrictions
http://www.securitytracker.com/id/1031922
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0332
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0334
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0335
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0342

Database .NET 14.7 released
http://www.postgresql.org/about/news/1575/

[CD 2015]「本気のサイバー攻撃者の組織像と手口を把握せよ」、ファイア・アイCTO名和氏
http://itpro.nikkeibp.co.jp/atcl/news/15/031300922/?ST=security

大塚商会、重複排除を生かした中小企業向け遠隔DRサービス
http://itpro.nikkeibp.co.jp/atcl/news/15/031300917/?ST=security

コマンド版Linux向けウイルス対策ソフト、RHEL7でも動作保証
http://itpro.nikkeibp.co.jp/atcl/news/15/031300915/?ST=security

2015年3月13日金曜日

13日 金曜日、大安

+ APSB15-05 Security updates available for Adobe Flash Player
https://helpx.adobe.com/security/products/flash-player/apsb15-05.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0332
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0334
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0335
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0342

+ UPDATE: SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle

+ patch 2.7.5 released
http://ftp.gnu.org/gnu/patch/?C=M;O=D

+ HPSBGN03249 rev.1 - HP ArcSight Enterprise Security Manager and Logger, Multiple Remote Vulnerabilities
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04562193&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7884
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7885

+ HPSBUX03281 SSRT101968 rev.1 - HP-UX running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04583581&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0413

+ Dovecot 2.2.16 released
http://www.dovecot.org/list/dovecot-news/2015-March/000283.html

+ Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free
http://cxsecurity.com/issue/WLB-2015030081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0311

+ Google Android Integer Oveflow / Heap Corruption
http://cxsecurity.com/issue/WLB-2015030079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7911

+ REMOTE: Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free
http://www.exploit-db.com/exploits/36360

+ SA63378 Hitachi JP1/Cm2/Network Node Manager Apache Tomcat Vulnerabilities
http://secunia.com/advisories/63378/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099

世界初の資格化を目指す、「脆弱性診断士」の取り組みが始まる
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/031000194/?ST=security

REMOTE: ElasticSearch Unauthenticated Remote Code Execution
http://www.exploit-db.com/exploits/36337

2015年3月12日木曜日

12日 木曜日、仏滅

+ マイクロソフト セキュリティ アドバイザリ 3033929 Windows 7 および Windows Server 2008 R2 で SHA-2 コード署名サポートを利用可能
https://technet.microsoft.com/ja-jp/library/security/3033929

+ UPDATE: マイクロソフト セキュリティ アドバイザリ 3046015 Schannel の脆弱性により、セキュリティ機能のバイパスが起こる
https://technet.microsoft.com/ja-jp/library/security/3046015

+ UPDATE: マイクロソフト セキュリティ アドバイザリ 2949927 Windows 7 および Windows Server 2008 R2 で SHA-2 ハッシュ アルゴリズムを利用可能
https://technet.microsoft.com/ja-jp/library/security/2949927

+ UPDATE: マイクロソフト セキュリティ アドバイザリ (2755801) Internet Explorer 上の Adobe Flash Player の脆弱性に対応する更新プログラム
https://technet.microsoft.com/ja-jp/library/security/2755801

+ RHSA-2015:0674 Important: kernel security and bug fix update
https://rhn.redhat.com/errata/RHSA-2015-0674.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369

+ CESA-2015:0672 Moderate CentOS 6 bind Security Update
http://lwn.net/Alerts/636241/

+ UPDATE: Cisco Secure Access Control System SQL Injection Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150211-csacs

+ UPDATE: Row Hammer Privilege Escalation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150309-rowhammer

+ UPDATE: Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl

+ Cisco Intrusion Prevention System MainApp Secure Socket Layer Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-ips
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0654

+ Multiple Vulnerabilities in Cisco TelePresence Video Communication Server, Cisco Expressway, and Cisco TelePresence Conductor
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0652
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0653

+ UPDATE: Multiple Vulnerabilities in ntpd Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

+ HS15-007 Multiple Vulnerabilities in JP1/Cm2/Network Node Manager i
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-007/index.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099

+ HS15-006 Cross-site Scripting Vulnerability in Hitachi IT Operations Analyzer
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-006/index.html

+ HS15-007 JP1/Cm2/Network Node Manager iにおける複数の脆弱性
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS15-007/index.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099

+ HS15-006 Hitachi IT Operations Analyzerにおけるクロスサイトスクリプティングの脆弱性
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS15-006/index.html

+ DoS/PoC: Microsoft Windows Text Services Memory Corruption (MS15-020)
http://www.exploit-db.com/exploits/36336

+ SA63336 libssh2 "kex_agree_methods()" Denial of Service Vulnerability
http://secunia.com/advisories/63336/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782

+ SA63343 Linux Kernel Xen PCI Non-Maskable Interrupt Denial of Service Vulnerability
http://secunia.com/advisories/63343/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150

+ SA63402 Opera Multiple Vulnerabilities
http://secunia.com/advisories/63402/

Java SE 7のサポート終了間近、脆弱性が放置される危険な状態に
http://itpro.nikkeibp.co.jp/atcl/news/15/031100881/?ST=security

Wikimedia財団と人権NGOなど、NSAを憲法違反で提訴
http://itpro.nikkeibp.co.jp/atcl/news/15/031100880/?ST=security

シマンテック、IoTセキュリティでニフティとの協業事例を説明
http://itpro.nikkeibp.co.jp/atcl/news/15/031100877/?ST=security

JVNVU#98897821 Telerik Analytics Monitor ライブラリに DLL ハイジャックが可能な脆弱性
http://jvn.jp/vu/JVNVU98897821/

DoS/PoC: Foxit Products GIF Conversion Memory Corruption (LZWMinimumCodeSize)
http://www.exploit-db.com/exploits/36334

DoS/PoC: Foxit Products GIF Conversion Memory Corruption (DataSubBlock)
http://www.exploit-db.com/exploits/36335

2015年3月11日水曜日

11日 水曜日、先負

+ 2015 年 3 月のマイクロソフト セキュリティ情報の概要
https://technet.microsoft.com/library/security/ms15-Mar

+ MS15-018 - 緊急 Internet Explorer 用の累積的なセキュリティ更新プログラム (3032359)
https://technet.microsoft.com/library/security/MS15-018
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1622
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1623
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1634

+ MS15-019 - 緊急 VBScript スクリプト エンジンの脆弱性により、リモートでコードが実行される (3040297)
https://technet.microsoft.com/library/security/MS15-019
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0032

+ MS15-020 - 緊急 Microsoft Windows の脆弱性により、リモートでコードが実行される (3041836)
https://technet.microsoft.com/library/security/MS15-020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0096

+ MS15-021 - 緊急 Adobe フォント ドライバーの脆弱性により、リモートでコードが実行される (3032323)
https://technet.microsoft.com/library/security/MS15-021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0074
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0089
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0093

+ MS15-022 - 緊急 Microsoft Office の脆弱性により、リモートでコードが実行される (3038999)
https://technet.microsoft.com/library/security/MS15-022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1633
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1636

+ MS15-023 - 重要 カーネルモード ドライバーの脆弱性により、特権が昇格される (3034344)
https://technet.microsoft.com/library/security/MS15-023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0078
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0095

+ MS15-024 - 重要 PNG 処理の脆弱性により、情報漏えいが起こる (3035132)
https://technet.microsoft.com/library/security/MS15-024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0080

+ MS15-025 - 重要 Windows カーネルの脆弱性により、特権が昇格される (3038680)
https://technet.microsoft.com/library/security/MS15-025
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0075

+ MS15-026 - 重要 Microsoft Exchange Server の脆弱性により、特権が昇格される (3040856)
https://technet.microsoft.com/library/security/MS15-026
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1628
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1629
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1630
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1631
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1632

+ MS15-027 - 重要 NETLOGON の脆弱性により、なりすましが行われる (3002657)
https://technet.microsoft.com/library/security/MS15-027
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0005

+ MS15-028 - 重要 Windows タスク スケジューラの脆弱性により、セキュリティ機能のバイパスが起こる (3030377)
https://technet.microsoft.com/library/security/MS15-028
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0084

+ MS15-029 - 重要 Windows フォト デコーダー コンポーネントの脆弱性により、情報漏えいが起こる (3035126)
https://technet.microsoft.com/library/security/MS15-029
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0076

+ MS15-030 - 重要 リモート デスクトップ プロトコルの脆弱性によりサービス拒否が発生する (3039976)
https://technet.microsoft.com/library/security/MS15-030
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0079

+ MS15-031 - 重要 Schannel の脆弱性により、セキュリティ機能のバイパスが起こる (3046049)
https://technet.microsoft.com/library/security/MS15-031
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1637

+ RHSA-2015:0672 Moderate: bind security update
https://rhn.redhat.com/errata/RHSA-2015-0672.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349

+ Google Chrome 41.0.2272.89 released
http://googlechromereleases.blogspot.jp/2015/03/stable-channel-update_10.html

+ Opera 28 released
http://www.opera.com/docs/changelogs/unified/2800/

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl

+ HPSBNS03280 rev.1 - HP NonStop Servers running SAMBA, Remote Execution of Arbitrary Code
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04583668&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240

+ UPDATE: Oracle Critical Patch Update Advisory - January 2015
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

+ PHP 5.6.5 heap buffer overflow in enchant_broker_request_dict()
http://cxsecurity.com/issue/WLB-2015030057

+ PHP 5.6.5 use after free in phar_object.c
http://cxsecurity.com/issue/WLB-2015030059

+ PHP 5.6.5 Double free with disabled ZMM
http://cxsecurity.com/issue/WLB-2015030058

世界のセキュリティ・ラボから
Superfishのルート証明書、マルウエアに署名
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/030800035/?ST=security

要件定義・基本設計で役立つ、安全なWebアプリ&インフラ構築術
第1回 セキュリティ対策の責任は誰にあるのか
http://itpro.nikkeibp.co.jp/atcl/column/15/021900028/022700003/?ST=security

レノボPCで拡散した危険ツール「Superfish」、本当の怖さ
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/030900190/?ST=security

「企業買収で広範な製品をそろえる」、シスコがセキュリティ戦略を説明
http://itpro.nikkeibp.co.jp/atcl/news/15/031000868/?ST=security

Apple、iOS 8.2で「FREAK」の脆弱性を修正
http://itpro.nikkeibp.co.jp/atcl/news/15/031000861/?ST=security

チェック・ポイント、「FREAK」脆弱性に対応するIPS保護機能を提供
http://itpro.nikkeibp.co.jp/atcl/news/15/031000858/?ST=security

UPDATE: JVNVU#99125992 SSL/TLS の実装が輸出グレードの RSA 鍵を受け入れる問題 (FREAK 攻撃)
http://jvn.jp/vu/JVNVU99125992/

UPDATE: JVNVU#93982119 ISC BIND 9 にサービス運用妨害 (DoS) の脆弱性
http://jvn.jp/vu/JVNVU93982119/

UPDATE: JVNVU#99234709 glibc ライブラリにバッファオーバーフローの脆弱性
http://jvn.jp/vu/JVNVU99234709/

JVNVU#90171154 複数の Apple 製品の脆弱性に対するアップデート
http://jvn.jp/vu/JVNVU90171154/

VU#794095 Telerik Analytics Monitor Library allows DLL hijacking
http://www.kb.cert.org/vuls/id/794095

2015年3月10日火曜日

10日 火曜日、友引

+ About the security content of Xcode 6.2
https://support.apple.com/en-us/HT204427
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3522
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390

+ About Security Update 2015-002
https://support.apple.com/en-us/HT204413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1066
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1067

+ About the security content of Apple TV 7.1
https://support.apple.com/en-us/HT204426
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1067
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1062

+ About the security content of iOS 8.2
https://support.apple.com/en-us/HT204423
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1067
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1064

+ ISC DHCP 4.3.2, 4.2.8 released
https://kb.isc.org/article/AA-01262
https://kb.isc.org/article/AA-01259

+ UPDATE: Row Hammer Privilege Escalation Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150309-rowhammer

+ HPSBGN03277 rev.1 - HP Virtualization Performance Viewer, Remote Execution of Code, Denial of Service (DoS) and Other Vulnerabilities
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04582466&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296

+ HPSBGN03284 rev.1 - HP Operations Manager i Management Pack for SAP, Local Unauthorized Access
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04588084&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2107

+ HPSBMU03278 rev.1 - HP Operations Manager SPI for SAP, Local Unauthorized Access
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04582567&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7887

+ HPSBMU03283 rev.1 - HP Virtual Connect Enterprise Manager SDK running OpenSSL on Windows, Remote Disclosure of Information, Denial of Service (DoS)
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04587108&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139

+ MySQL 5.7.6 released
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-6.html

+ LOCAL: Rowhammer: Linux Kernel Privilege Escalation PoC
http://www.exploit-db.com/exploits/36310

Acrobatにも対応したファイル暗号化&二次利用防止ソフト最新版
http://itpro.nikkeibp.co.jp/atcl/news/15/030900843/?ST=security

無料でも攻撃と盗聴から利用者を守る、最強のセキュアWi-Fiへの道
http://itpro.nikkeibp.co.jp/atcl/watcher/14/334361/030500206/?ST=security

ラドウェア、オンプレ/クラウドのハイブリッド防御を実現するDDoS対策サービスを発表
http://itpro.nikkeibp.co.jp/atcl/news/15/030900836/?ST=security

JVNVU#99125992 SSL/TLS の実装が輸出グレードの RSA 鍵を受け入れる問題 (FREAK 攻撃)
http://jvn.jp/vu/JVNVU99125992/

LOCAL: Rowhammer: NaCl Sandbox Escape PoC
http://www.exploit-db.com/exploits/36311

2015年3月9日月曜日

9日 月曜日、先勝

+ マイクロソフト セキュリティ アドバイザリ 3046015 Schannel の脆弱性により、セキュリティ機能のバイパスが起こる
https://technet.microsoft.com/ja-jp/library/security/3046015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1637

+ Mozilla Firefox 36.0.1 released
https://www.mozilla.org/en-US/firefox/36.0.1/releasenotes/

+ Linux kerne 3.19.1, 3.18.9, 3.14.35, 3.10.71, 3.2.68 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.9
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.35
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.71
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.68

+ Tcl/Tk 8.5.18 released
http://www.tcl.tk/software/tcltk/8.5.html

+ VU#243585 SSL/TLS implementations accept export-grade RSA keys (FREAK attack)
http://www.kb.cert.org/vuls/id/243585

+ Linux Kernel Buffer Overflow in eCryptfs Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1031860
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683

+ Wireshark ATN-CPDLC/WCP/LLDP/TNEF/SCSI OSD Dissector Bugs Let Remote Users Deny Service
http://www.securitytracker.com/id/1031858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192

+ Linux Kernel XFS Attribute Processing Flaw Lets Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1031853
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0274

+ Glibc nss_files File Pointer Reset Lets Remote Users Deny Service
http://www.securitytracker.com/id/1031838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121

+ SA63171 OpenSSL Two Vulnerabilities
http://secunia.com/advisories/63171/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288

+ SA63272 Microsoft Windows Server 2003 Export RSA Downgrade Security Bypass Vulnerability
http://secunia.com/advisories/63272/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1637

+ Linux Kernel KVM CVE-2015-0239 Local Privilege Escalation Vulnerability
http://www.securityfocus.com/bid/72842
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239

JVNDB-2015-000038 WordPress 用プラグイン All In One WP Security & Firewall におけるクロスサイトリクエストフォージェリの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000038.html

JVNDB-2015-000037 WordPress 用プラグイン All In One WP Security & Firewall における SQL インジェクションの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000037.html

UPDATE: JVN#64455813 Squid における入力値検証の不備に関する脆弱性
http://jvn.jp/jp/JVN64455813/

暗号化通信を解読される「FREAK」脆弱性、Windowsも影響を受ける
http://itpro.nikkeibp.co.jp/atcl/news/15/030600830/?ST=security

[MWC2015]なんでもネットにつながる時代の守り方、トレンドマイクロが参考展示
http://itpro.nikkeibp.co.jp/atcl/news/15/030600824/?ST=security

2015年3月6日金曜日

6日 金曜日、仏滅

+ RHSA-2015:0628 Important: 389-ds-base security, bug fix, and enhancement update
https://rhn.redhat.com/errata/RHSA-2015-0628.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8105

+ Red Hat Enterprise Linux 7.1 Released
https://rhn.redhat.com/errata/RHEA-2015-0590.html
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.1_Release_Notes/index.html

+ RHSA-2015:0384 Low: powerpc-utils security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0384.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4040

+ RHSA-2015:0425 Moderate: openssh security, bug fix and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0425.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9278

+ RHSA-2015:0416 Important: 389-ds-base security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0416.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8112

+ RHSA-2015:0301 Moderate: hivex security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0301.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9273

+ RHSA-2015:0325 Low: httpd security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0325.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581

+ RHSA-2015:0349 Important: qemu-kvm security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0349.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106

+ RHSA-2015:0377 Moderate: libreoffice security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0377.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0247
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693

+ RHSA-2015:0439 Moderate: krb5 security, bug fix and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0439.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423

+ RHSA-2015:0442 Moderate: ipa security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0442.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5312
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6662

+ RHSA-2015:0642 Important: thunderbird security update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0642.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836

+ RHSA-2015:0430 Moderate: virt-who security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0430.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0189

+ RHSA-2015:0290 Important: kernel security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0290.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8086
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0274

+ RHSA-2015:0330 Low: pcre security and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0330.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964

+ RHSA-2015:0323 Low: libvirt security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0323.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236

+ RHSA-2015:0535 Low: GNOME Shell security, bug fix, and enhancement update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0535.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300

+ RHSA-2015:0327 Moderate: glibc security and bug fix update 2015-03-05
https://rhn.redhat.com/errata/RHSA-2015-0327.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121

+ RHSA-2015:0383 Moderate: ppc64-diag security, bug fix, and enhancement update
https://rhn.redhat.com/errata/RHSA-2015-0383.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4038
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4039

+ HPSBHF03279 rev.1 - HP Point of Sale PCs Running Windows with OPOS Drivers, Remote Execution of Code
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04583185&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7888
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7889
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7890
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7892
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7893
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7894
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7895
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7897
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7898

+ Windows Schannel TLS Export Cipher Bug Lets Remote Users Downgrade Session Security
http://www.securitytracker.com/id/1031833

+ Linux Kernel IRET Instruction #SS Fault Handling Crash PoC
http://cxsecurity.com/issue/WLB-2015030033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322

+ Linux Kernel PPP-over-L2TP Socket Level Handling Crash PoC
http://cxsecurity.com/issue/WLB-2015030034
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943

+ Linux Kernel Associative Array Garbage Collection Crash PoC
http://cxsecurity.com/issue/WLB-2015030032
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3631

翻訳サイト経由で情報漏洩、「利用禁止」だけでは解決しない
http://itpro.nikkeibp.co.jp/atcl/column/14/507007/030300004/?ST=security

チェックしておきたい脆弱性情報<2015.03.06>
http://itpro.nikkeibp.co.jp/atcl/column/14/268561/030300045/?ST=security

メールを使ったサイバー攻撃、99%は「脆弱性を悪用しない」
http://itpro.nikkeibp.co.jp/atcl/news/15/030500815/?ST=security

成田空港の公式Webサイトが改ざん被害、悪意あるサイトへ勝手に誘導
http://itpro.nikkeibp.co.jp/atcl/news/15/030500809/?ST=security

UPDATE: JVN#91016415 まろやかリレー小説におけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN91016415/

UPDATE: JVN#09871547 まろやかイメージアルバムにおけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN09871547/

UPDATE: JVN#63687798 まろやか一言ボードにおけるクロスサイトスクリプティングの脆弱性
http://jvn.jp/jp/JVN63687798/

JVNVU#98923085 ShareLaTeX に複数の脆弱性
http://jvn.jp/vu/JVNVU98923085/

2015年3月5日木曜日

5日 木曜日、先負










+ phpMyAdmin 4.0.10.9, 4.2.13.2 and 4.3.11.1 are released
http://sourceforge.net/p/phpmyadmin/news/2015/03/phpmyadmin-40109-42132-and-43111-are-released/

+ PMASA-2015-1 Risk of BREACH attack due to reflected parameter
http://www.phpmyadmin.net/home_page/security/PMASA-2015-1.php

+ Wireshark 1.12.4 released
https://www.wireshark.org/docs/relnotes/wireshark-1.12.4.html

+ wnpa-sec-2015-06 ATN-CPDLC dissector crash
https://www.wireshark.org/security/wnpa-sec-2015-06.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187

+ wnpa-sec-2015-07 The WCP dissector could crash
https://www.wireshark.org/security/wnpa-sec-2015-07.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188

+ wnpa-sec-2015-08 The pcapng file parser could crash
https://www.wireshark.org/security/wnpa-sec-2015-08.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189

+ wnpa-sec-2015-09 The LLDP dissector could crash
https://www.wireshark.org/security/wnpa-sec-2015-09.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190

+ wnpa-sec-2015-10 The TNEF dissector could go into an infinite loop. Discovered by Vlad Tsyrklevich
https://www.wireshark.org/security/wnpa-sec-2015-10.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191

+ wnpa-sec-2015-11 The SCSI OSD dissector could go into an infinite loop. Discovered by Vlad Tsyrklevich
https://www.wireshark.org/security/wnpa-sec-2015-11.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192

+ UPDATE: Multiple Vulnerabilities in ntpd Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

+ Check Point response to TLS FREAK Attack (CVE-2015-0204)
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk105062&src=securityAlerts
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204

+ Citrix Security Advisory for RSA Export Key ‘FREAK’ Vulnerability
http://support.citrix.com/article/CTX200491

+ Courier-IMAP 4.16.0 released
http://www.courier-mta.org/download.html

+ Symantec NetBackup OpsCenter for Linux/Unix Input Validation Flaw Permits Cross-Site Scripting Attacks
http://www.securitytracker.com/id/1031831

+ Apple OS X TLS Export Cipher Bug Lets Remote Users Downgrade Session Security
http://www.securitytracker.com/id/1031830

+ Apple iOS TLS Export Cipher Bug Lets Remote Users Downgrade Session Security
http://www.securitytracker.com/id/1031829

+ REMOTE: Symantec Web Gateway 5 restore.php Post Authentication Command Injection
http://www.exploit-db.com/exploits/36263

+ REMOTE: Seagate Business NAS Unauthenticated Remote Command Execution
http://www.exploit-db.com/exploits/36264

+ DoS/PoC: Linux Kernel IRET Instruction #SS Fault Handling - Crash PoC
http://www.exploit-db.com/exploits/36266

+ DoS/PoC: Linux Kernel PPP-over-L2TP Socket Level Handling - Crash PoC
http://www.exploit-db.com/exploits/36267

+ DoS/PoC: Linux Kernel Associative Array Garbage Collection - Crash PoC
http://www.exploit-db.com/exploits/36268

+ SSL/TLS Vulnerability Explained
http://cxsecurity.com/issue/WLB-2015030024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204

+ PostgreSQL password hashing
http://cxsecurity.com/issue/WLB-2015030023

Fujitsu Develops Column-Oriented Data-Processing Engine that accelerates analytic processing more than fifty-fold on a single server with PostgreSQL open-source database
http://www.postgresql.org/about/news/1573/

Meet the PostgresDAC v3.0.0
http://www.postgresql.org/about/news/1574/

JVNDB-2015-000036 まろやかリレー小説におけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000036.html

JVNDB-2015-000035 まろやかイメージアルバムにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000035.html

JVNDB-2015-000034 まろやか一言ボードにおけるクロスサイトスクリプティングの脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000034.html

世界のセキュリティ・ラボから
人間ファイアウォールを通過するソーシャルエンジニアリング
http://itpro.nikkeibp.co.jp/atcl/column/14/264220/030200034/?ST=security

サイバー攻撃防止へ官民情報共有、日米欧それぞれの悩み
http://itpro.nikkeibp.co.jp/atcl/column/14/346926/030300185/?ST=security

「あなたのiPhoneが見つかりました!」、ロック解除を狙うフィッシング
http://itpro.nikkeibp.co.jp/atcl/news/15/030400797/?ST=security

中国、米大統領のテロ対策法批判に反論
http://itpro.nikkeibp.co.jp/atcl/news/15/030400782/?ST=security

2015年3月4日水曜日

4日 水曜日、友引

+ Google Chrome 41.0.2272.76 released
http://googlechromereleases.blogspot.jp/2015/03/stable-channel-update.html

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ UPDATE: Multiple Vulnerabilities in ntpd Affecting Cisco Products
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd

+ HPSBST03274 rev.1 - HP XP P9000 Command View Advanced Edition Software Online Help for Windows and Linux, Remote Cross-site Scripting (XSS)
https://h20566.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04582371&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7896

+ Java SE Development Kit 8, Update 40 released
http://www.oracle.com/technetwork/java/javase/8u40-relnotes-2389089.html

+ PuTTY 0.64 released
http://www.chiark.greenend.org.uk/~sgtatham/putty/

+ Symantec Web Gateway 5 restore.php Command Injection
http://cxsecurity.com/issue/WLB-2015030016
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7285

+ SA63204 Symantec NetBackup OpsCenter Script Insertion Vulnerability
http://secunia.com/advisories/63204/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1483

JVNDB-2015-000030 WordPress 用プラグイン Google Captcha (reCAPTCHA) by BestWebSoft における CAPTCHA 保護メカニズムを回避される脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000030.html

JVNDB-2015-000029 WordPress 用プラグイン Captcha における CAPTCHA 保護メカニズムを回避される脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000029.html

3割以上が「業務メールの誤送信」を経験、そのうち9割近くは“累犯”
http://itpro.nikkeibp.co.jp/atcl/news/15/030300773/?ST=security

JVN#55063777 WordPress 用プラグイン Google Captcha (reCAPTCHA) by BestWebSoft における CAPTCHA 保護メカニズムを回避される脆弱性
http://jvn.jp/jp/JVN55063777/

JVN#93727681 WordPress 用プラグイン Captcha における CAPTCHA 保護メカニズムを回避される脆弱性
http://jvn.jp/jp/JVN93727681/

VU#302668 ShareLaTeX vulnerable to remote command execution and information disclosure
http://www.kb.cert.org/vuls/id/302668

2015年3月3日火曜日

3日 火曜日、先勝


+ phpMyAdmin-4.3.11 released
http://sourceforge.net/p/phpmyadmin/news/2015/03/phpmyadmin-4311-release-notes/

+ UPDATE: GNU Bash Environment Variable Command Injection Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash

+ InterstageやSystemwalker関連製品:TLS1.0実装におけるセキュリティ脆弱性の問題
http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_tls_201501.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8730

+ SYM15-003 Security Advisories Relating to Symantec Products - Symantec NetBackup OpsCenter Server Javascript Injection RCE
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150302_00
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1483

+ PuTTY fails to clear private key information from memory
http://cxsecurity.com/issue/WLB-2015030003
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2157

PoWA 2: Finding the Missing Index !
http://www.postgresql.org/about/news/1572/

Superfishの再発を防ぐ、レノボがプリインストールソフトを大幅削減へ
http://itpro.nikkeibp.co.jp/atcl/news/15/030200737/?ST=security

UPDATE: JVNVU#93982119 ISC BIND 9 にサービス運用妨害 (DoS) の脆弱性
http://jvn.jp/vu/JVNVU93982119/

UPDATE: JVNVU#99205169 Bluetooth Stack for Windows by Toshiba および TOSHIBA Service Station に権限昇格の脆弱性
http://jvn.jp/vu/JVNVU99205169/

2015年3月2日月曜日

2日 月曜日、赤口

+ Selenium Server 2.45.0 released
http://code.google.com/p/selenium/wiki/Grid2

+ Selenium IE Driver Server 2.45.0 released
http://selenium.googlecode.com/git/cpp/iedriverserver/CHANGELOG

+ Selenium Client & WebDriver 2.45.0 released
http://selenium.googlecode.com/git/java/CHANGELOG

+ About the security content of OS X Yosemite v10.10.2 and Security Update 2015-001
https://support.apple.com/en-us/HT204244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4426
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4497
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4460
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4498
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8816
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8820
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8821
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4488
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8822
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4421
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2391
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4461
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8826
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8827
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8828
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8830
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8838
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8831
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8839
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8832
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8833
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8834

+ About the security content of Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
https://support.apple.com/en-us/HT204243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4479

+ About the security content of iOS 8.1.3
https://support.apple.com/en-us/HT204245
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4488
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4493
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4459
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4466
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4471
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4479

+ About the security content of Apple TV 7.0.3
https://support.apple.com/en-us/HT204246
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4488
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4459
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4466
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4470
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4471
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4473
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4474
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352

+ UPDATE: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost

+ UPDATE: SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle

+ HPSBST03257 rev.1 - HP Storage Provisioning Manager for HP Matrix Operating Environment running OpenSSL, Disclosure of Information
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04568546&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566

+ HPSBUX03244 SSRT101885 rev.2 - HP-UX Running OpenSSL, Remote Denial of Service (DoS) and Other Vulnerabilites
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04556853&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204

+ HPSBUX03273 SSRT101951 rev.1 - HP-UX running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
https://h20565.www2.hp.com/hpsc/doc/public/display?calledBy=&docId=emr_na-c04580241&docLocale=ja_JP
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0400
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0403
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412

+ Linux kernel 3.18.8, 3.14.34, 3.10.70 released
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.8
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.34
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.70

+ VU#632140 Multiple Toshiba products are vulnerable to trusted service path privilege escalation
http://www.kb.cert.org/vuls/id/632140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0884

+ Glibc Buffer Overflow in vfscanf May Let Remote or Local Users Execute Arbitrary Code
http://www.securitytracker.com/id/1031818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473

+ Glibc ResolveIPAddr() May Write DNS Request to Random File Descriptors Under High Load
http://www.securitytracker.com/id/1031801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423

+ SA63010 Linux Kernel "sctp_assoc_update()" Memory Corruption Vulnerability
http://secunia.com/advisories/63010/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421

+ SA63035 Kaspersky PURE Unspecified SSL/TLS Vulnerability
http://secunia.com/advisories/63035/

+ SA63149 GNU C Library "FCT()" Denial of Service Vulnerability
http://secunia.com/advisories/63149/

JVNDB-2015-000031 SEIL シリーズルータにおけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000031.html

JVNDB-2015-000033 jBCrypt におけるストレッチング処理に関する脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000033.html

JVNDB-2015-000024 Joyful Note におけるファイル操作に関する脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000024.html

JVNDB-2015-000028 KENT-WEB 製 Clip Board における任意のファイルを削除される脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000028.html

JVNDB-2015-000032 checkpw におけるサービス運用妨害 (DoS) の脆弱性
http://jvndb.jvn.jp/ja/contents/2015/JVNDB-2015-000032.html

インターポールの役割は「銭形警部」ではなく「ISP」――中谷総局長
http://itpro.nikkeibp.co.jp/atcl/news/15/022700723/?ST=security

REMOTE: Persistent Systems Client Automation Command Injection RCE
http://www.exploit-db.com/exploits/36206