$B%;%-%e%j%F%#%[!<%k(B memo

Last modified: Wed Jul 1 23:51:22 2009 +0900 (JST)


$B!!(BSecurity Watch $B$5$s$,E9$8$^$$$5$l$F$7$^$C$?$N$G!"(B $B8D?M$GDI$$$+$1$F$_$k%F%9%H$G$9!#(B $BHwK:O?$H$7$F=q$$$F$*$/$D$b$j$J$N$G!"(B Security Watch $B$5$s$N$h$&$J>\:Y$J$b$N$G$O$"$j$^$;$s!#(B $B4pK\E*$J%?!<%2%C%H$O(B UNIX$B!"(BWindows$B!"(BMac OS (priority $B=g(B) $B$H$7$^$9!#(B $B$^$?!"$3$N%Z!<%8$NFbMF$O$I$N%Z!<%8$K$bA}$7$FL5J]>Z$G$"$k$3$H$r@k8@$7$F$*$-$^$9!#A4$F$N>pJs$,=8$^$C$F$$$k$o$1$b$"$j$^$;$s!#(B

$B!!$3$3$K:\$;$k>pJs$K$D$$$F$O!"2DG=$J8B$j(B 1 $BpJs8;$X$N%j%s%/$r:n@.$7$F$*$-$^$9!#(B $B3F<+$G(B 1 $BpJs8;$NFbMF$r3NG'$7$F$/$@$5$$!#(B $B$3$N%Z!<%8$NFbMF$r$/$l$0$l$b1-0{$_$K$7$J$$$h$&$K!#(B $B4V0c$$$rH/8+$5$l$?J}!"5-:\$5$l$F$$$J$$>pJs$r$4B8CN$NJ}!"$<$R(B$B$*$7$($F$/$@$5$$(B$B!#$h$m$7$/$*4j$$$$$?$7$^$9!#(B

$B!!$3$N%Z!<%8$N>pJs$rMxMQ$5$l$kA0$K!"(B$BCm0U=q$-(B$B$r$*FI$_$/$@$5$$!#(B


$B!!(B[ $BDjHV>pJs8;(B ] $B!!2a5n$N5-;v(B: 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998


[SCAN Security Wire NP Prize 2001]

$B!V(BScan Security Wire$B!W(B $BSCAN Security Wire NP Prize 2001 $B$r^(B$B$7$^$7$?!#(B

$B!!(B

$B!V%M%C%H%i%s%J!o=,^$r!"%Y%9%H!&%*%V!&>o=,^$r^$7$^$7$?!#(B


www.iraqbodycount.org www.iraqbodycount.org

$BI|4)%j%/%(%9%H
$B%8%'%$%`%:(B.$B#F(B.$B%@%K%,%s!V(B $B?7!&@oAh$N%F%/%N%m%8!<(B$B!W(B($B8=:_(B27$BI<(B)
$BCf;3?.90!V(B$B%=%U%H%&%'%"$NK!E*J]8n(B$B!W(B ($B8=:_(B119$BI<(B) ($B%*%s%G%^%s%I9XF~2D(B)
$B%j%G%k!&%O!<%H!V(B$B@oN,O@!!4V@\E*%"%W%m!<%A(B$B!W(B ($BI|4)7hDj(B)
$BN&0f;0O:Lu!&JT!V(B$B%Y%H%J%`5"4TJ<$N>Z8@(B$B!W(B ($B8=:_(B103$BI<(B)
$BNS9nL@!V(B$B%+%U%+%9$N>.$5$J9q!!%A%'%A%'%sFHN)1?F0;OKv(B$B!W(B ($B8=:_(B166$BI<(B)

RSS $B$KBP1~$7$F$_$^$7$?!#(B $B>.%M%?$O4^$^$l$F$$$^$;$s!#!V@/<#$M$?%&%<%'!W$H$$$&?M$O(B RSS $B%Y!<%9$GFI$`$H9,$;$K$J$l$k$G$7$g$&(B ($B%&%6$/$J$$?M$O(B $B$3$C$A$N(B RSS $B$,$h$$$+$b$7$l$^$;$s(B)$B!#(B RSS 1.0 $B$G$9$N$G!"$"$/$^$G(B RDF Site Summary $B$G$9!#(B $B8=:_$O(B Really Simple Syndication $B$K$OBP1~$7$F$$$^$;$s!#(B
$B:#$9$0(B Really Simple Syndication $B$,$[$7$$?M$O!"$N$$$s$5$s$K$h$k(B Web $B%5%$%H$N(B RSS $B$r>! $B$r;2>H$7$F$/$@$5$$!#(B($B$N$$$s$5$s>pJs$"$j$,$H$&$4$6$$$^$9(B)

$B<BMQ(B SSH $BBh(B2$BHG(B: $B%;%-%e%
2 $B:~$,=P$^$7$?!#(B$B%*%i%$%j!<$GCmJ8$7(B$B!"Hw9MMw$K!VI,$:(B2$B:~$G$"$k$3$H!W$H=q$/$H(B 2 $B:~$r3N

$B"#(B 2009.07.01

$B"#(B $BDI5-(B

$B$$$m$$$m(B (2009.06.04)

$B!!(B[SA35623] Intel e1000 Driver Denial of Service Vulnerability$B!#(Be1000 $B$N7o!"(BIntel $B$+$i=$@5HG%I%i%$%P$,8x3+$5$l$?LOMM!#(B

$B"#(B $B$$$m$$$m(B (2009.07.01)
(various)


$B"#(B 2009.06.30


$B"#(B 2009.06.29


$B"#(B 2009.06.28

$B"#(B $B$$$m$$$m(B (2009.06.28)
(various)


$B"#(B 2009.06.27

$B"#(B $BDI5-(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (971778) Microsoft DirectShow $B$N@H


$B"#(B 2009.06.26

$B"#(B $BDI5-(B

Microsoft Security Essentials Beta


$B"#(B 2009.06.25

$B"#(B $BDI5-(B

Microsoft Security Essentials Beta

$B!!(B$BJF(BMS$B$,L5NA%&%$%k%9BP:v%=%U%H$N%Y!<%?HG$r8BDj8x3+!"F|K\$OBP>]30(B ($BF|7P(B IT Pro, 2009.06.25)

$BBP>]$OJF9q!&%$%9%i%(%k!&Cf9q!&%V%i%8%k$N%f!<%6!

$B!!$"$i$i!"(B$B:#%"%/%;%9$9$k$H(B$B!V(BNot available in your country or region$B!W$H8@$o$l$F$7$^$&$J$"!#(B

$B"#(B $B%&%$%k%98!:w%(%s%8%s(B VSAPI 8.950 ($B%S%k%I(B1094) Windows NTKD$BHG8x3+$N$*CN$i$;(B
($B%H%l%s%I%^%$%/%m(B, 2009.06.24)

$B!!%H%l%s%I%^%$%/%m$N%&%$%k%98!:w%(%s%8%s(B VSAPI 8.911 ($B0JA0(B?) $B$K7g4Y!#(B LZH $B%U%!%$%k$N%X%C%@$N07$$$K7g4Y$,$"$j!"96N,(B LZH $B%U%!%$%k$K$h$C$F(B DoS $B967b$r

$B!!(BVSAPI 8.950 ($B%S%k%I(B1094) $B$G=$@5$5$l$F$$$k!#(B


$B"#(B 2009.06.24

$B"#(B APSB09-08: Security Update available for Shockwave Player
(Adobe, 2009.06.23)

$B!!(BShockwave Player 11.5.0.596 $B0JA0$K7g4Y!#(B 11.0.0.465 $B$G=$@5$5$l$?$O$:$N(B CVE-2009-1860 $B$N!V(Bbackwards compatibility mode variation of the issue with Shockwave Player 10 content$B!W$K%d%i$l$F$7$^$&!#(B

$B!!(BShockwave Player 11.5.0.600 $B$G=$@5$5$l$F$$$k!#(B$BF~$B!#(BShockwave Player $B$,%$%s%9%H!<%k$5$l$F$$$k$+H]$+$O!"$?$H$($P(B$B$3$N%Z!<%8(B$B$G3NG'$G$-$k$_$?$$!#(B

$B"#(B $BDI5-(B

ESET Smart Security $B$N%Q!<%=%J%k%U%!%$%"%&%)!<%k5!G=%P!<%8%g%s(B1047(20090525)$B$NDL?.>c32$K$D$$$F(B

$B!!(B ESET Smart Security $B$N%Q!<%=%J%k%U%!%$%"%&%)!<%k5!G=%P!<%8%g%s(B1047(20090525)$B$NDL?.>c32$K$D$$$F(B ($B%-%d%N%s(B IT $B%=%j%e!<%7%g%s%:(B) $B$,99?7$5$l$F$$$^$9!#(BESET Smart Security $B$r:F%$%s%9%H!<%k$9$l$P2r7h$9$k$h$&$G$9!#(B

$B"#(B Microsoft Security Essentials Beta
(Microsoft, 2009.06.23)

$B!!L($A$c$s%G%S%e!

This beta is available only to customers in the United States, Israel (English only), People's Republic of China (Simplified Chinese only) and Brazil (Brazilian Portuguese only)

$B!!$H$$$&$o$1$G!"F|K\8lHG$O$^$@$J$$$h!#MQ0U$5$l$F$$$k$N$O!"(B32bit $BHG(B Windows XP / Vista / Windows 7$B!"$*$h$S(B 64bit $BHG(B Vista / Windows 7 $BMQ!#(B 64bit $BHG(B Windows XP $B$N?M$O;DG0$G$7$?!#(B

$B!!$H$j$"$($:(B VMware $B>e$N(B Windows XP SP3 $B$KF~$l$F$_$?$1$I!"0-$/$J$$46$8!#(B

2009.06.25 $BDI5-(B:

$B!!(B$BJF(BMS$B$,L5NA%&%$%k%9BP:v%=%U%H$N%Y!<%?HG$r8BDj8x3+!"F|K\$OBP>]30(B ($BF|7P(B IT Pro, 2009.06.25)

$BBP>]$OJF9q!&%$%9%i%(%k!&Cf9q!&%V%i%8%k$N%f!<%6!

$B!!$"$i$i!"(B$B:#%"%/%;%9$9$k$H(B$B!V(BNot available in your country or region$B!W$H8@$o$l$F$7$^$&$J$"!#(B

2009.06.26 $BDI5-(B:

$B!!(BMicrosoft Security Essentials$B%Y!<%?HG$N;H$$>! (ComputerWorld.jp, 2009.06.25)


$B"#(B 2009.06.23

$B"#(B ESET Smart Security $B$N%Q!<%=%J%k%U%!%$%"%&%)!<%k5!G=%P!<%8%g%s(B1047(20090525)$B$NDL?.>c32$K$D$$$F(B
($B%-%d%N%s(B IT $B%=%j%e!<%7%g%s%:(B, 2009.06.23)

$B!!%&%$%k%9Dj5A%U%!%$%k(B 4179(20090622) $B0J9_(B + $B%Q!<%=%J%k%U%!%$%"%&%)!<%k5!G=%P!<%8%g%s(B 1047(20090525) + Windows Vista $B$GDL?.$G$-$J$/$J$k$=$&$G!#(B ESET $B$N%Q!<%=%J%k%U%!%$%"%&%)!<%k5!G=$rDd;_$9$l$P2sHr$G$-$k$N$@$=$&$G!#(B

$B!!4XO"(B: Network connection problems after updating of the firewall module to version 1047 (ESET, 2009.06.23)$B!#$3$A$i$G$bF1MM$K%Q!<%=%J%k%U%!%$%"%&%)!<%k$NDd;_$r;X<($7$F$^$9!#(B

2009.06.24 $BDI5-(B:

$B!!(B ESET Smart Security $B$N%Q!<%=%J%k%U%!%$%"%&%)!<%k5!G=%P!<%8%g%s(B1047(20090525)$B$NDL?.>c32$K$D$$$F(B ($B%-%d%N%s(B IT $B%=%j%e!<%7%g%s%:(B) $B$,99?7$5$l$F$$$^$9!#(BESET Smart Security $B$r:F%$%s%9%H!<%k$9$l$P2r7h$9$k$h$&$G$9!#(B

$B"#(B $BDI5-(B

Slowloris HTTP DoS

$B!!(BApache HTTP DoS tool mitigation (SANS ISC, 2009.06.21)$B!#6d$NCF4]$O$J$$!#(B(IIS $B$H$+$K>h$j$+$($k!"$H$+$$$&%Q%?!<%s$r=|$1$P(B)

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (971778) Microsoft DirectShow $B$N@H

$B"#(B Stable, Beta update: Security fix
(Google Chrome Release blog, 2009.06.22)

$B!!(BGoogle Chrome 2.0.172.33 $BEP>l!#(B CVE-2009-2121 $B$,=$@5$5$l$F$$$k$=$&$G!#(B

$B"#(B Thunderbird 2.0.0.22 $B%j%j!<%9%N!<%H(B
(mozilla.jp, 2009.06.23)

$B!!=P$^$7$?$h!#(BSeaMonkey 1.1.17 $B$b=P$F$^$9$M!#(B

$B"#(B [SA35515] LibTIFF "LZWDecodeCompat()" Buffer Underflow Vulnerability
(Secunia, 2009.06.23)

$B!!(BLibTIFF 3.8.2 $B$K7g4Y!#(BLZWDecodeCompat() $B$G(B buffer overflow $B$,H/@8$9$kLOMM!#(B

$B!!(BCVE $B>e$G$O=$@5$5$l$F$$$kLOMM!#(B Bug 2065 - LZWDecodeCompat buffer underflow $B$r;2>H!#(B

$B"#(B [SA35521] SSVNC OpenSSL Multiple Vulnerabilities
(Secunia, 2009.06.23)

$B!!(BSSVNC $B$H$$$&%=%U%H$,$"$k$N$G$9$M!#(B

SSVNC adds encryption security to VNC connections. It provides a GUI for Windows, Mac OS X, and Unix that automatically starts up an STUNNEL SSL tunnel for SSL or ssh for SSH connections to any other VNC server.

$B!!(BOpenSSL $BM3Mh$N7g4Y$@$=$&$G!#(B SSVNC 1.0.23 $B$G=$@5$5$l$F$$$k$=$&$G$9!#(B

$B"#(B VU#251793: Foxit Reader contains multiple vulnerabilities in the processing of JPX data
(US-CERT, 2009.06.19)

$B!!(BFoxit Reader 3.0 + JPEG2000/JBIG2 Decoder $B%"%I%*%s(B 2.0 Build 2009.303 $B$K7g4Y!#(B JPEG2000 $B%9%H%j!<%`$*$h$S(B JPEG2000 $B%X%C%@$N07$$$K7g4Y$,$"$j!"(BPDF $B%U%!%$%kCf$N(B $B96N,(B JPEG2000 $B%G!<%?$K$h$C$FG$0U$N%3!<%I$rl9g$K$O!"$3$N7g4Y$N1F6A$O$J$$!#(B CVE-2009-0690 CVE-2009-0691

$B!!(BFoxit Reader 3.0 Build 1817 + JPEG2000/JBIG2 Decoder $B%"%I%*%s(B 2.0 Build 2009.616 $B$G=$@5$5$l$F$$$k!#(B

$B!!4XO"(B: Two Security Vulnerabilities Fixed in Foxit Reader 3.0 and JPEG2000/JBIG2 Decoder (foxitsoftware.com)$B!#=$@5$^$G$N%?%$%`%i%$%s$,<($5$l$F$$$k!#(B Foxit Software Company $B$N%j%j!<%9%(%s%8%K%"%j%s%0$,3@4V8+$($F6=L#?<$$!#(B


$B"#(B 2009.06.22


$B"#(B 2009.06.21


$B"#(B 2009.06.20

$B"#(B $BDI5-(B

Slowloris HTTP DoS


$B"#(B 2009.06.19

$B"#(B Slowloris HTTP DoS
(ha.ckers.org, 2009.06.17)

$B!!(BHTTP $B%5!<%P$KBP$9$k(B DoS $B967b%D!<%k(B Slowloris 0.7 $BEP>l!#(BApache 1.x / 2.x$B!"(Bdhttpd$B!"(BGoAhead WebServer$B!"(B Squid $B$K$O8z2L$,$"$j!"(B IIS 6.0 / 7.0$B!"(Blighttpd $B$K$O8z2L$,$J$$$=$&$@!#(B Windows $B>e$G$O$&$^$/F0$+$J$$LOMM!#(B

$B!!4XO"(B: $B%9%m!<%m%j%9$N;t0i$r9M$($F$$$kJ}$X(B ($B9a@n8)(B)

2009.06.21 $BDI5-(B:

$B!!(BPHP $BHG(B: [Full-disclosure] apache and squid dos

2009.06.24 $BDI5-(B:

$B!!(BApache HTTP DoS tool mitigation (SANS ISC, 2009.06.21)$B!#6d$NCF4]$O$J$$!#(B(IIS $B$H$+$K>h$j$+$($k!"$H$+$$$&%Q%?!<%s$r=|$1$P(B)

$B"#(B $BI8E*7?%a!<%k967b$N!HM=KI@\?t$,46@w$9$k$b3X=,8z2L$"$j(B
(Internet Watch, 2009.06.19)

$B!!71N}71N}$^$?71N}!#4XO"(B: $B!VI8E*7?967b!WBP:v$K$O!HM=KI@\Z(B ($BF|7P(B IT Pro, 2009.06.19)

$B"#(B $BDI5-(B

About the security content of iPhone OS 3.0 Software Update

APSB09-07: Security Updates available for Adobe Reader and Acrobat

$B!!(BUnix $BHG(B Adobe Reader 9.1.2 / 8.1.6 $B=P$F$$$^$9!#(B Adobe Reader for Unix (Adobe)


$B"#(B 2009.06.18

$B"#(B McAfee Agent(Common Management Agent)$B$GH/8+$5$l$?(BActiveX$B$N@H
($B%^%+%U%#!<(B, 2009.06.18)

$B!!$3$N7o(B: McAfee, Inc. 3.6.0.608 Policy Manager naPolicyManager.dll Arbitrary Data Write (milw0rm)$B!#(BWindows $BHG(B CMA 3.5.x / 3.6.x$B!"(BMcAfee Agent 4.0.x $B$N7g4Y!#(B

$B!!(Bpatch $B$O$^$@$J$$!#(BKill bit $B$r@_Dj$7$F2sHr$9$kJ}K!$,5-:\$5$l$F$$$k!#(B $B@_DjMQ(B .reg $B%U%!%$%k(B $B$bG[I[$5$l$F$$$k!#(B

$B!!(BCMA 3.5.x / 3.6.x $B$K$D$$$F$O!"=$@5$5$l$kM=Dj$O$J$$!#(BMcAfee 4.0 $B$K$D$$$F$O!"

$B"#(B About the security content of iPhone OS 3.0 Software Update
(Apple, 2009.06.17)


$B"#(B 2009.06.17

$B"#(B URL shortening service compromised
(viruslist.com, 2009.06.16)

$B!!(BURL $BC;=L%5!<%S%9$C$F(B ($B$$$m$s$J0UL#$G(B) $B%d%P$$$h$M!"$H$$$&$N$O@N$+$i$"$kOC$G$9$,!"$D$$$K!"(B URL $BC;=L%5!<%S%9$,96N,$5$l$?$&$(!"!V(B200 $BK|0J>e$NC;=L(B URL $B$,FCDj$N(B 1 $B$D$N(B URL $B$K8~$1$i$l$k!W$H$$$&;vBV$,H/@8$7$?$N$@$=$&$G!#(B

$B!!(Bcli.gs $B$O!"(B4th Most Popular URL Shortener on Twitter $B$J$s$@$C$F$5!#(B


$B"#(B 2009.06.16

$B"#(B $BDI5-(B

$B"#(B 7$B7n$O!V(BTwitter$B%P%07n4V!W!"(BWeb 2.0$B$N0BA4$r9M$($k$-$C$+$1$K(B
(ITmedia, 2009.06.16)

$B!!(BMonth of Twitter Bugs $B$@$=$&$G$9$h1|$5$s!#(B

$B"#(B Exploiting TCP and the Persist Timer Infinitenes
(Phrack.org, 2009.06.11)

$B!!(BTCP Persist Timer $B$KBP$9$k(B DoS $B967b!#(B $BM}O@2r@b!"(BOpenBSD 4.3 $B$*$h$S(B Linux 2.6.18 $B$KBP$9$kZ!"967b%D!<%k$N%=!<%9!#(B

$B"#(B SHA-1$B$N@H
(yebo blog, 2009.06.12)

$B!!Ce

$B"#(B Buggy 'smart meters' open door to power-grid botnet: Grid-burrowing worm only the beginning
(The Register, 2009.06.12)

$B!!%P%0$C$F$$$k!V(B$B%9%^!<%HEENO7W(B$B!W$,EENOLV%\%C%H%M%C%H$X$NF;$r3+$/(B?! $BMh7n$N(B BlackHat USA 2009 $B$G%G%b$k(B?!

$B"#(B $B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (971888) DNS $B%G%\%k%VMQ$N99?7%W%m%0%i%`(B
(Microsoft, 2009.06.10)

$B!!(BWindows $B$N(B resolver $B$K$O!V(BDNS $B%G%\%k%V5!G=!W$H$$$&$b$N$,$D$$$F$$$k$N$@$,!"(B 957579 patch $B$rE,MQ$9$k$H!"!V(BDNS $B%G%\%k%V5!G=!W$NF0:n$r$"$kDxEY@)8f$G$-$k$h$&$K$J$k$=$&$G!#(B $B>\:Y$K$D$$$F$O(B KB 957579 $B$r;2>H!#$A$c$s$H$7$?F|K\8lHG$,$[$7$$$G$9$M!#(B

$B!!4XO"(B: Windows Server 2003 $B$N(B DNS $BMQ$N?7$7$$%0%k!<%W(B $B%]%j%7!<(B (Microsoft KB 294785)$B!#4N?4$J$H$3$m$,4V0c$C$F$$$k(B KB$B!#1Q8lHG$O@5$7$$$N$G$9$,!#(B

$B"#(B $B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (969898) ActiveX $B$N(B Kill Bit $B99?7%W%m%0%i%`$N%m!<%k%"%C%W(B
(Microsoft, 2009.06.10)

$B"#(B $B8&5f
(ZDNet, 2009.06.16)

$B!!L5@~%-!<%\!<%I%9%K%C%U%!(B Keykeriki $B$N7o!#%O!<%I%&%'%"$bHNGdM=Dj$@$=$&$G!#(B

Please note, we will provide pre made PCB's and components very soon at a fair price. Please check back after some time.

$B"#(B 2009.06.15

$B"#(B Microsoft 2009 $BG/(B 6 $B7n$N%;%-%e%j%F%#>pJs(B
(Microsoft, 2009.06.10)

$B!!:#$4$m$K$J$C$F=q$$$F$F%"%l$G$9$,!D!D!#(B

MS09-018 - $B6[5^(B: Active Directory $B$N@H

  • Active Directory $B$NL58z$J2rJ|$N@HCVE-2009-113

    Windows 2000 Server $B>e$N(B Active Directory $B$K7g4Y!#(B $B%a%b%j$N2rJ|=hM}$K7g4Y$,$"$j!"(B $B96N,(B LDAP / LDAPS $B%j%/%(%9%H$K$h$C$FG$0U$N%3!<%I$r

  • Active Directory $B$N%a%b%j(B $B%j!<%/$N@HCVE-2009-1139

    Windows 2000 Server / Server 2003 $B>e$N(B Active Directory$B!"(B $B$*$h$S(B Windows XP / Server 2003 $B>e$N(B Active Directory Application Mode (ADAM) $B$K7g4Y!#%a%b%j$N4IM}$K7g4Y$,$"$j!"96N,(B LDAP / LDAPS $B%j%/%(%9%H$K$h$C$F(B DoS $B967b$r

MS09-019 - $B6[5^(B: Internet Explorer $BMQ$NN_@QE*$J%;%-%e%j%F%#99?7%W%m%0%i%`(B (969897)

$B!!(BKB 969897 $B$K$OHs%;%-%e%j%F%#$J99?7$K$D$$$F$b=R$Y$i$l$F$$$k!#(B

MS09-020 - $B=EMW(B: $B%$%s%?!<%M%C%H(B $B%$%s%U%)%a!<%7%g%s(B $B%5!<%S%9(B (IIS) $B$N@H:3J$5$l$k(B (970483)

$B!!(BIIS 6.0 + WebDAV: Unicode $B%P%0$N5U=1(B $B$N7o$J$N$G$9$,!"(BIIS 5.0 $B$H(B IIS 5.1 / 6.0 $B$H$G(B CVE $B$,JL$K$J$C$F$$$k$_$?$$!#(B

  • IIS 5.0 $B$N(B WebDAV $B$NG'>Z2sHr$N@HCVE-2009-1122

    Exploitability Index: 3

  • IIS 5.1 $B$*$h$S(B 6.0 $B$N(B WebDAV $B$NG'>Z2sHr$N@HCVE-2009-1535

    Exploitability Index: 1

MS09-021 - $B6[5^(B: Microsoft Office Excel $B$N@H

$B!!$$$:$l$N7g4Y$b!"G$0U$N%3!<%I$N

  • $B%l%3!<%I(B $B%]%$%s%?!<$NGKB;$N@HCVE-2009-0549

    Excel 2000 / 2002 / 2003$B!"(BOffice for Mac 2004 / 2008$B!"(BOffice Open XML File Converter for MAC$B!"(BExcel Viewer 2003 $B$N7g4Y!#(B Exploitability Index: 2

  • $B%*%V%8%'%/%H(B $B%l%3!<%I$NGKB;$N@HCVE-2009-0557

    Excel 2000 / 2002 / 2003 / 2007$B!"(BOffice for Mac 2004 / 2008$B!"(BOffice Open XML File Converter for MAC$B!"(BExcel Viewer 2003 / 2007$B!"(BWord/Excel/PowerPoint 2007 $B%U%!%$%k7A<0MQ(B Microsoft Office $B8_495!G=%Q%C%/(B $B$N7g4Y!#(B Exploitability Index: 1

  • $BG[Ns%$%s%G%C%/%9$N%a%b%j$NGKB;$N@HCVE-2009-0558

    Excel 2000$B!"(BOffice for Mac 2004 / 2008$B!"(BOffice Open XML File Converter for MAC $B$N7g4Y!#(B Exploitability Index: 2

  • $BJ8;zNs$N%3%T!<$N%9%?%C%/%Y!<%9$N%*!<%P!<%i%s$N@HCVE-2009-0559

    Excel 2000 / 2002 $B$N7g4Y!#(B Exploitability Index: 1

  • $B%U%#!<%k%I(B $B%5%K%?%$%CVE-2009-0560

    Excel 2000 / 2002 / 2003 / 2007$B!"(BOffice for Mac 2004 / 2008$B!"(BOffice Open XML File Converter for MAC$B!"(BExcel Viewer 2003 / 2007$B!"(BWord/Excel/PowerPoint 2007 $B%U%!%$%k7A<0MQ(B Microsoft Office $B8_495!G=%Q%C%/(B $B$N7g4Y!#(B Exploitability Index: 3

  • $B%l%3!<%I$N@0?t$N%*!<%P!<(B $B%U%m!<$N@HCVE-2009-0561

    Excel 2000 / 2002 / 2003 / 2007$B!"(BOffice for Mac 2004 / 2008$B!"(BOffice Open XML File Converter for MAC$B!"(BExcel Viewer 2003 / 2007$B!"(BWord/Excel/PowerPoint 2007 $B%U%!%$%k7A<0MQ(B Microsoft Office $B8_495!G=%Q%C%/!"(BSharePoint Server 2007 $B$N7g4Y!#(B Exploitability Index: 1

  • $B%l%3!<%I(B $B%]%$%s%?!<$NGKB;$N@HCVE-2009-1134

    Excel 2007$B!"(BExcel Viewer 2007$B!"(BWord/Excel/PowerPoint 2007 $B%U%!%$%k7A<0MQ(B Microsoft Office $B8_495!G=%Q%C%/(B $B$N7g4Y!#(B Exploitability Index: 1

MS09-022 - $B6[5^(B: Windows $B0u:~%9%W!<%i!<$N@H

$B!!0u:~%9%W!<%i!<$K(B 3 $B$D$N7g4Y!#(B

  • $B0u:~%9%W!<%i!<$N%P%C%U%!!<(B $B%*!<%P!<%U%m!<$N@HCVE-2009-0228

    Windows 2000 $B$N$_$N7g4Y!#96N,(B RPC $B%j%/%(%9%H$K$h$j!"(Bremote $B$+$i(B$0U$N%3!<%I$r

  • $B0u:~%9%W!<%i!<$N%U%!%$%kFI$_CVE-2009-0229

    Windows 2000 / XP / Server 2003 / Vista / Server 2008 $B$K7g4Y!#(B local user $B$,%7%9%F%`>e$NA4$F$N%U%!%$%k$rFI$_

  • $B0u:~%9%W!<%i!<$N%i%$%V%i%jFI$_9~$_$N@HCVE-2009-0230

    Windows 2000 / XP / Server 2003 / Vista / Server 2008 $B$K7g4Y!#(B $B967bl9g$K!"G$0U$N(B DLL $B$,%m!<%I$5$l$F$7$^$$!"8"8B>e>:$,2DG=$H$J$k!#(BWindows2000 / XP / Server 2003 $B$O!V7Y9p!W$@$,!"(BVista / Server 2008 $B$G$O!V=EMW!W$K%i%s%/$5$l$F$$$k!#(B

MS09-023 - $B7Y9p(B: Windows $B%5!<%A$N@HpJsO3$($$$,5/$3$k(B (963093)

$B!!(BWindows XP / Server 2003 $B>e$N(B Windows Search 4.0 $B$K7g4Y!#(B CVE-2009-0239

  1. $B96N,(B HTML $B%U%!%$%k$rL\I8%7%9%F%`$K;E3]$1$k!#(B $B%U%!%$%k$=$N$b$N$r@_CV$7$?$j!"EE;R%a!<%k$H$7$F%a!<%k%\%C%/%9$K4^$^$;$?$j$9$k!#(B

  2. $BEv3:%f!<%6$,8!:w$rl9g$G$b!"A*Br$7$F%W%l%S%e!<$9$k$H!"%U%!%$%kCf$N%9%/%j%W%H$,L57Y9p$G

$B4XO"(B: MS09-023: Windows Search and MSHTML Host Apps (Microsoft Security Research & Defense, 2009.06.09)

MS09-024 - $B6[5^(B: Microsoft Works $B%3%s%P!<%?!<$N@H

$B!!(B($B8e$GDI2CM=Dj(B)


$B"#(B 2009.06.13

$B"#(B $B1Q(BISP$B$N(BVAserv$B!"(Bzero-day$B967b$r
(slashdot.jp, 2009.06.12)

$B!!GX7J(B:

  • $B2>A[4D6-4IM}%=%U%H(B HyperVM$B!"(B $B$*$h$S!"(BHyperVM $B$rAH$_9~$s$@2>A[%[%9%F%#%s%0%W%i%C%H%[!<%`(B Kloxo ($B5l>N(B Lxadmin) $B$,B8:_!#(B lxlabs.com $B$,3+H/!#(B

  • $B$3$l$i$O6H3&$G9-$/MxMQ$5$l$F$$$?!#(B

$B!!:#2s$N>u67(B:

$BF|IU(B $B$G$-$4$H(B
2009.05.21

$B$"$k?MJ*$,(B Kloxo $B$N@HpJs$r(B lxlabs $B$KDLCN!#(B $B$7$+$7(B lxlabs $B$O@HpJs$rI>2A$7$?$h$&$K$O8+$($J$$LOMM!#(B

2009.06.04

$B@HpJs$,8x3+$5$l$?!#(Bhttp://milw0rm.com/exploits/8880

2009.06.05

lxlabs $B$,!VJ#?t$N%;%-%e%j%F%#7g4Y$,H/8+$5$l!":G?7HG$G=$@5$5$l$?$N$G99?7$h$m!W$H%"%J%&%s%9!#(BMultiple Security Issues in hyperVM/Kloxo (lxlabs.com, 2009.06.05)

message #67179 $B$r8+$k8B$j$G$O!"(B $B%"%J%&%s%9;~E@$K$*$1$k!V:G?7HG!W$N(B HyperVM $B$N%P!<%8%g%s$O(B 2.0.7942 $B$@$C$?$h$&$@$,!"(B http://download.lxlabs.com/download/hypervm/production/hypervm/ $B$K$O(B 2.0.7942 $B$+$i(B 2.0.7992 $B$^$G$N%P!<%8%g%s$,B8:_$9$k!#(B ($BF|IU$O(B 2009.06.06 $B$@$J$"(B)

2009.06.07

VAserv $B$O$3$N$"$?$j$G$d$i$l$?$C$]$$!#(B Security Alert: Shut Down HyperVM & LxAdmin/Kloxo Immediately (wickedfire.com)

2009.06.08

Webhost hack wipes out data for 100,000 sites: Vaserv suspects zero-day virtualization vuln (The Register, 2009.06.08)$B!#(B 2.0.7992 $B$G$bBLL\$@$C$?LOMM!#(B

"We were hit by a zero-day exploit" in version 2.0.7992 of the application, he said. "I've heard from other people they've been hit by the same thing."

$B!!$G!"@$$NCf$N2>A[%[%9%F%#%s%0%5!<%S%9$O!"8=:_!"(BHyperVM / Kloxo $B$rDd;_$7$F$$$kLOMM!#(B

$B"#(B $BDI5-(B


$B"#(B 2009.06.12

$B"#(B $B$$$m$$$m(B (2009.06.12)
(various)

CVE-2009-1151: phpMyAdmin Remote Code Execution Proof of Concept

$B!!(BCVE-2009-1151 $B$@$=$&$G$9!#(B

FreeBSD 6.x / 7.x $B$K(B 3 $B$D$N7g4Y(B

[SA35399] Ruby BigDecimal Denial of Service Vulnerability

$B!!(BBigDecimal $BI8=`%i%$%V%i%j$K7g4Y$,$"$j!"%i%$%V%i%j$r;HMQ$9$k%"%W%j$,(B crash $B$9$k>l9g$,$"$k!#(Bruby 1.8.6-p369 / 1.8.7-p173 $B$G=$@5$5$l$F$$$k!#(B

[SA35407] MoinMoin Hierarchical ACL Security Bypass Security Issue

$B!!(BMoinMoin 1.8.4 $B$G=$@5$5$l$F$$$k!#(B

[SA35422] Perl Compress::Raw::Zlib Module Off-by-One Vulnerability

$B!!(Bperl $B%b%8%e!<%k(B Compress::Raw::Zlib $B$K(B off-by-one $B%(%i!

$B"#(B Firefox 3.0.11 $B%j%j!<%9%N!<%H(B
(mozilla.jp, 2009.06.12)

$B!!(B9 $B$D$N7g4Y(B$B$,=$@5$5$l$F$^$9$M!#=EBg$J7g4Y$b$"$$$+$o$i$:$"$j$^$9$M!#(B

$B"#(B $BDI5-(B

W32/Generic.worm.aa$B$N8mG'$K$D$$$F(B

$B!!(B$BF|K\8l>pJs(B$B$b99?7$5$l$^$7$?!#(B

$B!Z(B2009/6/12$B99?7![(B
$BDj5A%U%!%$%k$KAH$_9~$^$l$F$$$k=hM}$N0lIt$H:G?7$N%b%8%e!<%k$G;HMQ$5$l$F$$$k%Q%U%)!<%^%s%9$N:GE,2=5!G=$,6%9g$7!"LdBj$,H/@8$9$k$3$H$,J,$+$j$^$7$?!#$3$N$?$a(B5637$B$NDj5A%U%!%$%k$h$j6%9g$9$k=hM}$N0lIt$r30$7!"8mG'$,H/@8$7$J$$$h$&=$@5$7$^$7$?!#(B

$B!!(BFalse positive detection for W32/Generic.worm.aa with VirusScan Enterprise 8.7i Patch 1 (McAfee, 2009.06.04) $B$b$5$i$K2~D{$5$l$F$^$7$?!#(B

Cause
The false detection was caused by an interaction between a single performance optimization function that was introduced with Patch 1 and whitelisting code delivered in the daily DAT files.

Solution
The whitelisting code has been disabled as part of the incremental 5639 DAT files released on Sunday, 7 June 2009.

$B!!(BDAT $BCf$N%[%o%$%H%j%9%H5!G=$H!"(BVSE 8.7i patch 1 $B$N%Q%U%)!<%^%s%98~>e5!G=$H$,$V$D$+$C$F$$$?!"$H$$$&$3$H$G$9$+$M!#%[%o%$%H%j%9%H5!G=$OL58z2=$5$l$?$=$&$G!#(B


$B"#(B 2009.06.11

$B"#(B Microsoft$B!"L5NA%;%-%e%j%F%#%5!<%S%9$r4V$b$J$/&B8x3+(B
(ITmedia, 2009.06.11)

$B!!(BMorro$B!"$$$h$$$h%G%S%e!<$G$9$h(B!

$B!V(BMicrosoft$B$NL5NA@=IJ$O4pK\E*$K!"HNGd=*N;$K$J$C$?(BOneCare$B$N=L>.HG$@!W$H(BSymantec$B$N%3%s%7%e!<%^!

$B!!$=$l$O$=$N$H$*$j$@$m$&$J$"!#(B

$B!V>CHq

$B!!$=$N!V%U%k5!G=$N%;%-%e%j%F%#%9%$!<%H!W$H$d$i$b==J,$K$O5!G=$7$J$$$N$,LdBj$J$N$G$O!#(B

$B"#(B $BDI5-(B

W32/Generic.worm.aa$B$N8mG'$K$D$$$F(B

$B!!(BFalse positive detection for W32/Generic.worm.aa with VirusScan Enterprise 8.7i Patch 1 (McAfee, 2009.06.04) $B$,(B 2009.06.08 $B$K2~D{$5$l$F$$$^$9!#(B

McAfee has isolated the cause of the issue and has addressed this as part of the incremental 5639 DAT files released on Sunday, 7 June 2009 and later.

$B!!(BDAT5639 $B0J9_$K99?7$7$?8e$K(B patch 1 $B$rE,MQ$9$l$P$h$$$h$&$G$9!#(B


$B"#(B 2009.06.10

$B"#(B Java SE 6 Update Release Notes: Changes in 1.6.0_14 (6u14)
(Sun, 2009.05.29)

$B!!(BJava SE 6u14 $B=P$F$^$9!#(BWindows Vista SP2 / Server 2008 SP2 $B$KBP1~$7$F$$$^$9!#(B Bug Fixes $B$N9`$K$O!"(Bclasses_security $B%5%V%+%F%4%j$J$b$N$,(B 3 $B$D!"(Bsecurity $B%5%V%+%F%4%j$J$b$N$,(B 2 $B$D$"$j$^$7$?!#(B($B0J2<0zMQ(B)

BugId Category Subcategory Description
6643094 java classes_security Test on keytool -startdate forgets about December
6787645 java classes_security CRL validation code should permit some clock skew when checking validity of CRLs
6819110 java classes_security Lazily load Sun digest provider for jar verification
6742114 java_deployment security Add black list support to JDK
6809110 java_deployment security JRE behavior unexpected when pre-trusting certificates (user or system)

$B!!(BBlacklist $B5!G=$O$3$&$$$&$b$N$@$=$&$G$9!#(B($B0J2<0zMQ(B)

Blacklist Jar Feature

Support for blacklisting signed jar files has been added to 6u14. A blacklist is a list of signed jars that contain serious security vulnerabilities that can be exploited by untrusted applets or applications. A system-wide blacklist will be distributed with each JRE release. Java Plugin and Web Start will consult this blacklist and refuse to load any class or resource contained in a jar file that's on the blacklist. By default, blacklist checking is enabled. The deployment.security.blacklist.check deployment configuration property can be used to toggle this behavior.

The blacklist entries are the union of the blacklist files pointed to by the deployment.system.security.blacklist and deployment.user.security.blacklist properties. By default, deployment.system.security.blacklist points to the blacklist file in the jre/lib/security directory, and deployment.user.security.blacklist points to a blacklist file that contains additional entries added by a user.

The blacklist is a text file with the following format:

attribute : value

Each jar file on the blacklist is identified by the x-Digest-Manifest attribute where x is the name of the MessageDigest algorithm, and the value is the base64 encoded hash value of the Manifest. Comments are denoted by lines starting with the # (number) symbol.

Here is an example:

# Buggy Utilities, version 1.0
SHA1-Digest-Manifest : QONXbQg+EtNOguIOAgpUUOadhv8=
# Malware Inc., version 99.99
SHA-256-Digest-Manifest : SewaudBCZ3iXt1KX0BeFHpQiiM1xYLtvLw3Ow2RJfcs=

$B!!(Bcadz $B$5$s>pJs$"$j$,$H$&$4$6$$$^$9!#(B

$B"#(B Google Chrome Stable update: 2 WebKit security fixes
(Google Chrome Releases, 2009.06.09)

$B!!(BGoogle Chrome 2.0.172.31 $BEP>l!#(B Safari 4.0 $B@5<0HG(B $B$G$b=$@5$5$l$F$$$?(B WebKit $B$N7o!"(B CVE-2009-1690 CVE-2009-1718 $B$,=$@5$5$l$F$$$k!#(B

$B"#(B APSB09-07: Security Updates available for Adobe Reader and Acrobat
(Adobe, 2009.06.09)

$B!!(BAdobe Reader / Acrobat 9.1.1 $B0JA0$K!"G$0U$N%3!<%I$N

$B!!(BAdobe Reader / Acrobat $BFbB"$N99?75!G=$r;H$C$F$b99?7$G$-$k$3$H$r

2009.06.19 $BDI5-(B:

$B!!(BUnix $BHG(B Adobe Reader 9.1.2 / 8.1.6 $B=P$F$$$^$9!#(B Adobe Reader for Unix (Adobe)

$B"#(B $BDI5-(B

Microsoft 2009 $BG/(B 5 $B7n$N%;%-%e%j%F%#>pJs(B

$B!!(BOffice 2004 / 2008 for Mac$B!"(B Open XML File Format Converter for Mac$B!"(BMicrosoft Works 8.5 / 9.0 $BMQ$N(B MS09-017 $B=$@5%W%m%0%i%`$,(B 2009.06.10 $BIU$G8x3+$5$l$?!#(B

IIS 6.0 + WebDAV: Unicode $B%P%0$N5U=1(B


$B"#(B 2009.06.09

$B"#(B About the security content of Safari 4.0
(Apple, 2009.06.09)

$B!!(BSafari 4.0 $B@5<0HGEP>l(B$B!#(BSafari 3.x $B$KB8:_$7$?BgNL$N7g4Y$,=$@5$5$l$F$$$k!#(B WebKit $B$N=$@5$bB??t4^$^$l$F$$$k$1$I!"B>$N>l=j$K$bHt$S2P$9$k$N$+$J!#(B

2009.06.10 $BDI5-(B:

$B!!4XO"(B:

$B"#(B $BDI5-(B


$B"#(B 2009.06.08


$B"#(B 2009.06.07


$B"#(B 2009.06.05

$B"#(B $B$$$m$$$m(B (2009.06.05)
(various)

[SA35344] Apache Tomcat 6 Denial of Service and Information Disclosure (secunia, 2009.06.05)

$B!!(BApache Tomcat 6.0.20 $BEP>l!#(BDoS $B7g4Y(B CVE-2009-0033$B!"(B $B>pJs3+<($N7g4Y(B CVE-2009-0580$B!"(B XSS $B7g4Y(B CVE-2009-0781$B!">pJs3+<($N7g4Y(B CVE-2009-0783 $B$,=$@5$5$l$F$$$k!#(B

$B!!4XO"(B:

[SA35326] Apache Tomcat Denial of Service and Information Disclosure (secunia, 2009.06.05)

$B!!(BApache Tomcat 6.0.20 $B$G=$@5$5$l$?(B 4 $B$D$N7g4Y$O!"(B Apache Tomcat 4.1.SVN $B$*$h$S(B Apache Tomcat 5.5.SVN $B$G$b=$@5$5$l$F$$$k!#(B

[SA35235] IBM DB2 Denial of Service and LDAP Authentication Security Issue (secunia, 2009.06.03)

$B!!(BDB2 9.1 Fixpak 7 / 9.5 Fixpak 4 $B$G=$@5$5$l$F$$$k$=$&$G!#(B CVE-2009-1905 CVE-2009-1906

ImageMagick "XMakeImage()" Integer Overflow Vulnerability (secunia, 2009.05.27)

$B!!(BImageMagick $B$N(B XMakeImage() $B$K7g4Y$,$"$j!"(B $B96N,2hA|%U%!%$%k$r;H$C$FG$0U$N%3!<%I$rCVE-2009-1882

$B!!(BImageMagick 6.5.2-8 $B0J9_$G=$@5$5$l$F$$$kLOMM!#(B

Winamp MAKI Parsing Vulnerability Details (VRT, 2009.05.20)

$B!!(BWinamp 5.552 $B$G=$@5$5$l$F$$$k!"(BMAKI $B%9%/%j%W%H$N7g4Y$N>\:Y!#(B

$B"#(B Adobe Security Bulletin Advance Notification
(Adobe Product Security Incident Response Team (PSIRT), 2009.06.04)

$B!!(BWindows Update $B$NF|$K$"$o$;$F!"(BAdobe Reader / Acrobat 7.x / 8.x / 9.x $B$N99?7HG$,EP>l$9$kM=Dj$NLOMM!#(B

Adobe expects to deliver security updates for Adobe Reader and Acrobat versions 7.x, 8.x, and 9.x for Windows and Macintosh on Tuesday, June 9.

$B!!$*$d!"(BUnix / Linux $BHG$OMQ0U$5$l$J$$$N$+$J!#(B

2009.06.10 $BDI5-(B:

$B!!$D$E$-(B: APSB09-07: Security Updates available for Adobe Reader and Acrobat

$B"#(B W32/Generic.worm.aa$B$N8mG'$K$D$$$F(B
($B%^%+%U%#!<(B, 2009.06.05)

$B!!%^%+%U%#!<(B VirusScan Enterprise 8.7 Patch 1 $B$*$h$S(B Total Protection Service 4.7.0.771 $B$K$*$$$F!"(BWindows $B$N%7%9%F%`%U%!%$%k$r(B W32/Generic.worm.aa $B$H$7$F8m8!=P$9$k;vNc$,H/@8$7$F$$$kLOMM!#%^%+%U%#!<$O$^$@>u67$rGD0.$G$-$F$$$J$$LOMM!#(B

$BK\LdBj$O!"0lIt$NCr7o$O8=:_J,$+$C$F$$$^$;$s$,!"$9$Y$F$NC $B"((B VirusScan Enterprise 8.7 Patch 1$BE,MQ$r$48!F$Cf$N$*5RMM$O!"(B $BK\LdBj$KBP$9$k>\:Y>pJs$,J@

$B!!(Bpatch $B$J$7$G$N8m8!=PH/@8$O3NG'$5$l$F$$$J$$$=$&$G!#$H$$$&$+!"(Bpatch 1 $B=P$F$?$N$+!#$?$@$$$^%@%&%s%m!<%ICf!#(B

$B!!4XO"(B:

  • False positive detection for W32/Generic.worm.aa with VirusScan Enterprise 8.7i Patch 1 (McAfee, 2009.06.04)$B!#BP>](B OS $B$O(B Windows XP / Vista $B$K$J$C$F$k$J$"!#(B

    To minimize customer impact, McAfee has removed VirusScan Enterprise 8.7i Patch 1 from the McAfee ServicePortal and other download sites. After the root cause for this issue is discovered and resolved, Patch 1 will be reposted to the ServicePortal and download site.

    $B$"$i$"$i!#(Bwww.mcafee.com/japan $B$+$i8=:_?J9T7A$G%@%&%s%m!<%ICf$J$N$@$1$I!#(B $B!D!D%@%&%s%m!<%I40N;!#(B

  • VSE 8.7i Patch 1 has been pulled (McAfee support folum, 2009.06.02$B!A(B)$B!#(BVSE 8.7i patch 1 $B$O!"8m8!=P0JA0$NIJ

2009.06.11 $BDI5-(B:

$B!!(BFalse positive detection for W32/Generic.worm.aa with VirusScan Enterprise 8.7i Patch 1 (McAfee, 2009.06.04) $B$,(B 2009.06.08 $B$K2~D{$5$l$F$$$^$9!#(B

McAfee has isolated the cause of the issue and has addressed this as part of the incremental 5639 DAT files released on Sunday, 7 June 2009 and later.

$B!!(BDAT5639 $B0J9_$K99?7$7$?8e$K(B patch 1 $B$rE,MQ$9$l$P$h$$$h$&$G$9!#(B

2009.06.12 $BDI5-(B:

$B!!(B$BF|K\8l>pJs(B$B$b99?7$5$l$^$7$?!#(B

$B!Z(B2009/6/12$B99?7![(B
$BDj5A%U%!%$%k$KAH$_9~$^$l$F$$$k=hM}$N0lIt$H:G?7$N%b%8%e!<%k$G;HMQ$5$l$F$$$k%Q%U%)!<%^%s%9$N:GE,2=5!G=$,6%9g$7!"LdBj$,H/@8$9$k$3$H$,J,$+$j$^$7$?!#$3$N$?$a(B5637$B$NDj5A%U%!%$%k$h$j6%9g$9$k=hM}$N0lIt$r30$7!"8mG'$,H/@8$7$J$$$h$&=$@5$7$^$7$?!#(B

$B!!(BFalse positive detection for W32/Generic.worm.aa with VirusScan Enterprise 8.7i Patch 1 (McAfee, 2009.06.04) $B$b$5$i$K2~D{$5$l$F$^$7$?!#(B

Cause
The false detection was caused by an interaction between a single performance optimization function that was introduced with Patch 1 and whitelisting code delivered in the daily DAT files.

Solution
The whitelisting code has been disabled as part of the incremental 5639 DAT files released on Sunday, 7 June 2009.

$B!!(BDAT $BCf$N%[%o%$%H%j%9%H5!G=$H!"(BVSE 8.7i patch 1 $B$N%Q%U%)!<%^%s%98~>e5!G=$H$,$V$D$+$C$F$$$?!"$H$$$&$3$H$G$9$+$M!#%[%o%$%H%j%9%H5!G=$OL58z2=$5$l$?$=$&$G!#(B

$B"#(B $B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#>pJs$N;vA0DLCN(B - 2009 $BG/(B 6 $B7n(B
(Microsoft, 2009.06.05)

$B!!$O$$!"$b$&$=$s$J5(@a$G$9!#(BWindows x 6$B!"(BIE x 1$B!"(BWord x 1$B!"(BExcel x 1$B!"(BOffice x 1 $B$@$=$&$G$9!#Fb!"(BWindows x 2$B!"(BIE x 1$B!"(BWord x 1$B!"(BExcel x 1$B!"(BOffice x 1 $B$O!V6[5^!W%l%Y%k!#(BIE 8 $B$b$5$C$=$/BP>]$K$J$C$F$^$9!#(B

$B!!(BJune 2009 Advance Notification (MSRC blog, 2009.06.04) $B$K$h$k$H!"(B $B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (971778) Microsoft DirectShow $B$N@H $B$N=$@5$O4^$^$l$J$$LOMM$G$9!#(B $B2sHrJ}K!(B$B$r


$B"#(B 2009.06.04

$B"#(B $B$$$m$$$m(B (2009.06.04)
(various)

New version (v 1.4.3.1) of BASE available (SANS ISC, 2009.06.04)

$B!!(BBasic Analysis and Security Engine (BASE) 1.4.3.1 $BEP>l!#J#?t$N(B XSS $B7g4Y$*$h$S(B SQL $B%$%s%8%'%/%7%g%s7g4Y$,=$@5$5$l$F$$$k$=$&$G!#(B

[SA35323] Microsoft Windows "SystemParametersInfo()" Denial of Service (secunia, 2009.06.04)

$B!!(BWindows XP SP3 / Server 2003 SP2 $B$K7g4Y!#(B SystemParametersInfo() $B$N=hM}$K7g4Y$,$"$j!"(B local user $B$,(B DoS $B967b$r

[SA35265] Linux Kernel e1000 Driver Denial of Service Vulnerability (secunia, 2009.06.04)

$B!!(BLinux $B$N(B e1000 $B$K7g4Y$,$"$j!"(Bremote $B$+$i(B DoS $B967b$r

2009.07.01 $BDI5-(B:

$B!!(B[SA35623] Intel e1000 Driver Denial of Service Vulnerability$B!#(Be1000 $B$N7o!"(BIntel $B$+$i=$@5HG%I%i%$%P$,8x3+$5$l$?LOMM!#(B

$B"#(B $BDI5-(B


$B"#(B 2009.06.03


$B"#(B 2009.06.02

$B"#(B QuickTime 7.6.2 & iTunes 8.2
(Apple, 2009.06.02)

$B!!(BQuickTime 7.6.2 & iTunes 8.2 $BEP>l!#9g7W(B 11 $B

QuickTime 7.6.2 $B$N%;%-%e%j%F%#%3%s%F%s%D$K$D$$$F(B (Apple)

$B!!(BQuickTime 7.6.2 $BEP>l!#(B10 $B

CVE $B7g4Y35MW(B $B%d%P$$%V%D(B
CVE-2009-0188 Sorenson 3 $B%S%G%*%U%!%$%k$N=hM}$K$*$$$F%a%b%jGK2u$,H/@8(B $B%`!<%S!<%U%!%$%k(B
CVE-2009-0951 FLC $B05=L%U%!%$%k$N=hM}$K$*$$$F(B buffer overflow $B$,H/@8(B FLC $B05=L%U%!%$%k(B
CVE-2009-0952 $B05=L(B PSD $B2hA|$N=hM}$K$*$$$F(B buffer overflow $B$,H/@8(B PSD $B2hA|%U%!%$%k(B
CVE-2009-0010 PICT $B2hA|$N=hM}$K$*$$$F@0?t(B underflow $B$,H/@8!#(BWindows $B$G$N$_H/@8!#(B PICT $B2hA|%U%!%$%k(B
CVE-2009-0953 PICT $B2hA|$N=hM}$K$*$$$F(B buffer overflow $B$,H/@8(B PICT $B2hA|%U%!%$%k(B
CVE-2009-0954 Clipping Region (CRGN) $B%"%H%`$N=hM}$K$*$$$F(B buffer overflow $B$,H/@8(B $B%`!<%S!<%U%!%$%k(B
CVE-2009-0185 MS ADPCM $B%*!<%G%#%*%G!<%?$N=hM}$K$*$$$F(B buffer overflow $B$,H/@8(B $B%`!<%S!<%U%!%$%k(B
CVE-2009-0955 $B%$%a!<%85-=R%"%H%`$N=hM}$K$*$$$F!"Id9f3HD%$NLdBj$,H/@8(B $B%S%G%*%U%!%$%k(B
CVE-2009-0956 $B%`!<%S!<%U%!%$%k$N=hM}$K$*$$$F!"=i4|2=$5$l$F$$$J$$%a%b%j$r;2>H(B $B%`!<%S!<%U%!%$%k(B
CVE-2009-0957 JP2 $B2hA|$N=hM}$K$*$$$F(B buffer overflow $B$,H/@8(B JP2 $B2hA|%U%!%$%k(B

iTunes 8.2 $B$N%;%-%e%j%F%#%3%s%F%s%D$K$D$$$F(B (Apple)

$B!!(BiTunes 8.2 $BEP>l!#(B CVE-2009-0950 $B$,=$@5$5$l$F$$$k!#(Bitms: URL $B$N=hM}$K$*$$$F(B buffer overflow $B$,H/@8$7$F$$$?$=$&$G!#(B

2009.06.04 $BDI5-(B:

$B!!(Bexploit:


$B"#(B 2009.06.01


$B2a5n$N5-;v(B: 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998


[$B%;%-%e%j%F%#%[!<%k(B memo]