$B%;%-%e%j%F%#%[!<%k(B memo

Last modified: Fri Aug 27 19:41:36 2010 +0900 (JST)


$B!!(BSecurity Watch $B$5$s$,E9$8$^$$$5$l$F$7$^$C$?$N$G!"(B $B8D?M$GDI$$$+$1$F$_$k%F%9%H$G$9!#(B $BHwK:O?$H$7$F=q$$$F$*$/$D$b$j$J$N$G!"(B Security Watch $B$5$s$N$h$&$J>\:Y$J$b$N$G$O$"$j$^$;$s!#(B $B4pK\E*$J%?!<%2%C%H$O(B UNIX$B!"(BWindows$B!"(BMac OS (priority $B=g(B) $B$H$7$^$9!#(B $B$^$?!"$3$N%Z!<%8$NFbMF$O$I$N%Z!<%8$K$bA}$7$FL5J]>Z$G$"$k$3$H$r@k8@$7$F$*$-$^$9!#A4$F$N>pJs$,=8$^$C$F$$$k$o$1$b$"$j$^$;$s!#(B

$B!!$3$3$K:\$;$k>pJs$K$D$$$F$O!"2DG=$J8B$j(B 1 $BpJs8;$X$N%j%s%/$r:n@.$7$F$*$-$^$9!#(B $B3F<+$G(B 1 $BpJs8;$NFbMF$r3NG'$7$F$/$@$5$$!#(B $B$3$N%Z!<%8$NFbMF$r$/$l$0$l$b1-0{$_$K$7$J$$$h$&$K!#(B $B4V0c$$$rH/8+$5$l$?J}!"5-:\$5$l$F$$$J$$>pJs$r$4B8CN$NJ}!"$<$R(B$B$*$7$($F$/$@$5$$(B$B!#$h$m$7$/$*4j$$$$$?$7$^$9!#(B

$B!!$3$N%Z!<%8$N>pJs$rMxMQ$5$l$kA0$K!"(B$BCm0U=q$-(B$B$r$*FI$_$/$@$5$$!#(B


$B!!(B[ $BDjHV>pJs8;(B ] $B!!2a5n$N5-;v(B: 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998


[SCAN Security Wire NP Prize 2001]

$B!V(BScan Security Wire$B!W(B $BSCAN Security Wire NP Prize 2001 $B$r^(B$B$7$^$7$?!#(B

$B!!(B

$B!V%M%C%H%i%s%J!o=,^$r!"%Y%9%H!&%*%V!&>o=,^$r^$7$^$7$?!#(B


www.iraqbodycount.org www.iraqbodycount.org

$BI|4)%j%/%(%9%H
$B%8%'%$%`%:(B.$B#F(B.$B%@%K%,%s!V(B $B?7!&@oAh$N%F%/%N%m%8!<(B$B!W(B($B8=:_(B44$BI<(B)
$BCf;3?.90!V(B$B%=%U%H%&%'%"$NK!E*J]8n(B$B!W(B ($B8=:_(B119$BI<(B) ($B%*%s%G%^%s%I9XF~2D(B)
$B%j%G%k!&%O!<%H!V(B$B@oN,O@!!4V@\E*%"%W%m!<%A(B$B!W(B ($B?7Lu=P$^$7$?(B: $B>e(B $B2<(B)
$BN&0f;0O:Lu!&JT!V(B$B%Y%H%J%`5"4TJ<$N>Z8@(B$B!W(B ($B8=:_(B108$BI<(B)
$BNS9nL@!V(B$B%+%U%+%9$N>.$5$J9q!!%A%'%A%'%sFHN)1?F0;OKv(B$B!W(B ($B8=:_(B176$BI<(B)

RSS $B$KBP1~$7$F$_$^$7$?!#(B $B>.%M%?$O4^$^$l$F$$$^$;$s!#!V@/<#$M$?%&%<%'!W$H$$$&?M$O(B RSS $B%Y!<%9$GFI$`$H9,$;$K$J$l$k$G$7$g$&(B ($B%&%6$/$J$$?M$O(B $B$3$C$A$N(B RSS $B$,$h$$$+$b$7$l$^$;$s(B)$B!#(B RSS 1.0 $B$G$9$N$G!"$"$/$^$G(B RDF Site Summary $B$G$9!#(B $B8=:_$O(B Really Simple Syndication $B$K$OBP1~$7$F$$$^$;$s!#(B
$B:#$9$0(B Really Simple Syndication $B$,$[$7$$?M$O!"$N$$$s$5$s$K$h$k(B Web $B%5%$%H$N(B RSS $B$r>! $B$r;2>H$7$F$/$@$5$$!#(B($B$N$$$s$5$s>pJs$"$j$,$H$&$4$6$$$^$9(B)

$B<BMQ(B SSH $BBh(B2$BHG(B: $B%;%-%e%
2 $B:~$,=P$^$7$?!#(B$B%*%i%$%j!<$GCmJ8$7(B$B!"Hw9MMw$K!VI,$:(B2$B:~$G$"$k$3$H!W$H=q$/$H(B 2 $B:~$r3N

$B"#(B 2010.08.27

$B"#(B $B%5%$%\%&%:(B Office $B$J$I$KJ#?t$N7g4Y(B
()

$B"#(B $BDI5-(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2269637) $B0BA4$G$J$$%i%$%V%i%j$N%m!<%I$K$h$j!"%j%b!<%H$G%3!<%I$,

$B"#(B ZDI-10-165: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Vulnerability
(Zero Day Initiative, 2010.08.26)

$B!!(BTrend Micro Internet Security Pro 2010 $B$K7g4Y!#(BUfPBCtrl.dll ActiveX $B%3%s%H%m!<%k$K7g4Y$,$"$j!"96N,(B Web $B%Z!<%8$r3+$/$HG$0U$N%3!<%I$,

$B!!(Bhot fix $B$,8x3+$5$l$F$$$k(B: [Hot Fix] UfPBCtrl.dll is vulnerable to remote attackers (trendmicro, 2010.08.22)

$B!!$3$l$C$F!"F|K\$G8@$&$H$3$m$N%&%$%k%9%P%9%?!<(B 2010 $B$J$s$G$9$+$M(B? Key Features of Trend Micro Internet Security $B$H(B Key Features of Trend Micro Internet Security Pro $B$r8+Hf$Y$k$H!"(BSystem Tuner $B$,$"$k$N$O(B Pro $B$@$1$@$J$"!#(B $B%&%$%k%9%P%9%?!<(B 2010 $B5!G=0lMw(B$B$K$O%7%9%F%`%A%e!<%J!<$,$"$k$N$G!"4pK\$O(B Pro $B$C$F$3$H$G$$$$$N$+$J!#(B $B$G$b!"(BOnline Backup $B$H$+!"%&%$%k%9%P%9%?!<(B 2010 $B$K$O$J$$5!G=$b$"$k$s$@$h$J!#(B $B%&%$%k%9%P%9%?!<(B 2010 $B$K$O(B UfPBCtrl.dll $B$O4^$^$l$F$$$k$N$+$J!#(B $B;H$C$F$J$$$+$i$o$+$i$J$$!#(B


$B"#(B 2010.08.26

$B"#(B $BDI5-(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2269637) $B0BA4$G$J$$%i%$%V%i%j$N%m!<%I$K$h$j!"%j%b!<%H$G%3!<%I$,


$B"#(B 2010.08.25

$B"#(B $B$$$m$$$m(B (2010.08.25)
(various)

$B"#(B About Security Update 2010-005
(Apple, 2010.08.24)

$B!!(BMac OS X 10.5.8 / 10.6.4 $BMQ%;%-%e%j%F%#%"%C%W%G!<%H!#(B13 $B

$B"#(B APSB10-20: Security update available for Shockwave Player
(Adobe, 2010.08.24)

$B!!(BShockwave Player 11.5.7.609 $B0JA0$K(B 20 $B7$/$b$N(B x 11$B!"(BDoS x 1)$B!#(B Shockwave Player 11.5.8.612 $B$G=$@5$5$l$F$$$k!#(B

$B"#(B $BDI5-(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2269637) $B0BA4$G$J$$%i%$%V%i%j$N%m!<%I$K$h$j!"%j%b!<%H$G%3!<%I$,


$B"#(B 2010.08.24

$B"#(B Winny $B$K?7$?$J(B 4 $B$D$N7g4Y(B
(JVN, 2010.08.20)

$B!!$@$=$&$G$9!#(B

$B"#(B $BDI5-(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2286198) Windows $B%7%'%k$N@H

$B!!4XO"(B:

APSB10-07: Security Advisory for Adobe Reader and Acrobat

$B!!(BAnatomy of a PDF Exploit (provos.org, 2010.08.19)$B!#(B CVE-2010-0188 exploit $B$N2r@b!#(B

Authorization Bypass When Executing An Embedded Executable.

$B!!(BAPSB10-17: Security Advisory for Adobe Reader and Acrobat (adobe) $B$,=P$F$$$^$9!#$3$l$K$O(B CVE-2010-1240 $B$N=$@5$,4^$^$l$F$$$k$=$&$J$N$G!"$b$7$+$7$?$i!">e5-$N!X!V%3%^%s%I

APSB10-17: Security Advisory for Adobe Reader and Acrobat

$B!!(BAPSB10-17 $B$,:FEY2~D{$5$l$F$^$9!#(B $BM=Dj$I$*$j(B 2010.08.20 $B$K=P$^$7$?!#(BCVE-2010-2862 $B$NB>$K$b!"(B CVE-2010-1240 $B$,=$@5$5$l$F$$$k!#(B/Launch /Action $B$N7o!"7Y9p2hLL$NI=5-$N:>>N$KBP$9$k!"$5$i$J$kBP1~$NLOMM!#(B

$B"#(B 8 $B7n(B 4 $BF|0J9_!"(BMicrosoft Update $B$,7c=E$K(B?
(various)

$B!!(B8 $B7n(B 4 $BF|0J9_!"(BMicrosoft Update $B$rA*Br$7$F$$$k$H(B wuauclt.exe $B$H(B svchost.exe $B$,BgNL$N%a%b%j$r>CHq$7$F$7$^$&$H$$$&;vNc$,3FCO$GH/@8$7$F$$$kLOMM!#(B $BFC$K!"(BWindows XP + 512 MB $B%a%b%j$H$$$C$?!"Dc%9%Z%C%/%^%7%s$K$*$$$F?<9o$J;vBV$H$J$kLOMM!#;0Bp$5$s>pJs$"$j$,$H$&$4$6$$$^$9!#(B (typo fixed: 572 $B$5$s46

$B!!(BMicrosoft Update $B$G$O$J$/(B Windows Update $B$rA*Br$9$k$3$H$G2sHr$G$-$F$$$kLOMM!#(B from http://hibari.2ch.net/test/read.cgi/win/1249441008/539

$B$^$"!"0lHV$NLdBj$O;HMQNL$J$N$O3N$+(B
$B%9%/%7%g$+$i$bJ,$k$H;W$&$1$I!":GBg(B810MB$B$^$G9T$C$F$k(B
Windows Update$B$K@Z$jBX$($k$H:GBgCM$O(B260MB$B$^$G$7$+9T$+$J$+$C$?(B

$B!!$"$H!"(BWindows Update / Microsoft Update $BJ}LL$G$O!"%"%s%A%&%$%k%9%=%U%H$,B-0z$C$Q$j$J$3$H$b$"$k$N$GCm0U!#(B Virus scanning recommendations for Enterprise computers that are running currently supported versions of Windows (Microsoft KB 822158) $B$K$"$k=|30@_Dj$O!"Dc%9%Z%C%/%^%7%s$J$iFC$K!"

$B"#(B VideoLAN Security Advisory 1004: Insufficient input validation in VLC TagLib plugin
(VideoLAN.org, 2010.08.18)

$B!!(BVLC Media Player 0.9.0 $B!A(B 1.1.2 $B$K7g4Y!#(BID3v2 $B%?%0$N07$$$K7g4Y$,$"$j!"96N,%a%G%#%"%U%!%$%k$K$h$C$F(B VLC Media Player $B$,%/%i%C%7%e$9$k!#G$0U$N%3!<%I$NCVE-2010-2937

$B!!(BVLC Media Player 1.1.3 $B$G=$@5$5$l(B$F$$$k!#Windows / Mac $BMQ%P%$%J%j$b8x3+$5$l$F$$$k!#$^$?(B VLC Media Player 1.0.6 / 1.1.x $BMQ$N(B patch $B$,8x3+$5$l$F$$$k!#(B

$B"#(B Google Chrome Stable Channel Update
(Google Chrome Release blog, 2010.08.19)

$B!!=54)(B Google Chrome, 5.0.375.127 $BEP>l!#(B9 $B7o$N7g4Y$,=$@5$5$l$F$$$k!#(B $BFb(B 8 $B7o$K>^6b$,$D$$$F$$$k!#(B

$B"#(B $B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2269637) $B0BA4$G$J$$%i%$%V%i%j$N%m!<%I$K$h$j!"%j%b!<%H$G%3!<%I$,
(Microsoft, 2010.08.24)

$B!!30It%i%$%V%i%j$r%m!<%I$9$k:]$K!"E,@Z$K%W%m%0%i%_%s%0$7$J$$$H!"(B $B0U?^$7$J$$>l=j$K$"$k(B DLL $B$r%m!<%I$7$F$7$^$&$3$H$,$"$kOC!#(B $B:#2s$O!"%U%!%$%k6&M-$rDL$8$F96N,(B DLL $B$,%m!<%I$5$l$F$7$^$&2DG=@-$,7|G0$5$l$F$$$kLOMM!#(B $B$3$l$N7o(B:

$B!!(BDynamic-Link Library Security (MSDN) $B$K!"2?$,5/$3$k$+!"$*$h$SBP=hJ}K!$,5-:\$5$l$F$$$k!#$$$$$+$2$s!"%+%l%s%H%G%#%l%/%H%j$O$d$a$h$&!D!D!#(B

$B!!4XO"(B:

2010.08.25 $BDI5-(B:

$B!!4XO"(B:

2010.08.26 $BDI5-(B:

$B!!4XO"(B:

2010.08.27 $BDI5-(B:

$B!!4XO"(B:


$B"#(B 2010.08.23


$B"#(B 2010.08.20

$B"#(B Ruby 1.9.2$B%j%j!<%9$H(BWEBrick$B@H
($B@>HxBYOB$N$O$F$J%@%$%"%j!<(B, 2010.08.19)

$B!!KhEY$*$5$o$,$;4k6H(B Apple $B$G$9$+!D!D!#(B


$B"#(B 2010.08.19

$B"#(B $B!ZCm0U4-5/![(Be$B%3%^!<%9%5%$%H$rI8E*$H$7$?%/%l%8%C%H%+!<%I>pJs$d8D?M>pJs$N@`
(LAC, 2010.08.19)

$B!!(BPHP / Linux $BA@$$$N967b$,A}$($F$$$k$N$+$J!#(B $B%M%C%H%9!<%Q!<(B8$BpJs(B1$BK|(B2191$B7o$,N.=P(B $B$H4X78$7$F$$$k$N$+$J$"!#(B

$B"#(B $BDI5-(B

QuickTime 7.6.6 / iTunes 9.1 $B8x3+(B

$B!!4XO"(B: ASPR #2010-08-18-1: Remote Binary Planting in Apple iTunes for Windows (acrossecurity.com, 2010.08.18)$B!#(BCVE-2010-1795 $B$N7o!#(B


$B"#(B 2010.08.18

$B"#(B $B8&5fZHV9f$r(B68$B!s2rFI(B
(CNET, 2010.08.18)

$B!!Ez$($O$=$3$K$"$kLOMM!#(B

$B"#(B $B$$$m$$$m(B (2010.08.18)
(various)

$B"#(B $BDI5-(B

$B!V(BJailbreakMe 2.0$B!W$,(BPDF$B%(%/%9%W%m%$%H$r;HMQ(B

$B!!(BiOS 4.0.2 / 3.2.2 $B$G=$@5$5$l$?7g4Y(B:

$B!!(BFreeType $B$NJ}$O(B iOS $B$K$H$I$^$i$J$$(B:

$B!!4XO"(B:

APSB10-17: Security Advisory for Adobe Reader and Acrobat

$B!!(BAPSB10-17 $B$,2~D{$5$l$?!#(B

Adobe expects to make these updates available on Thursday August 19, 2010.

$B!!JF9qF|IU$G$7$g$&$+$i!"F|K\;~4V$G$O(B 2010.08.20 $B$+$J!#(B


$B"#(B 2010.08.17

$B"#(B Opera 10.61 released
(Opera.com, 2010.08.12)

$B!!(BOpera 10.61 $BEP>l!#(B Changelog $B$K$h$k$H!"(B3 $B7o$N%;%-%e%j%F%#99?7$,4^$^$l$F$$$kLOMM$G$9!#(B

$B"#(B Google Chrome Stable Channel Update
(Google Chrome Release blog, 2010.08.11)

$B!!(BGoogle Chrome 5.0.375.126 $BEP>l!#(B

This version contains an updated version of the Flash plugin.

$B!!(BAPSB10-16: Security update available for Adobe Flash Player $B$K$"$o$;$F$N99?7!"$H$$$&$3$H$+$J!#(B

$B"#(B APSB10-18: Security update: Hotfix available for ColdFusion
(Adobe, 2010.08.10)

$B!!(BColdFusion 8.0 / 8.0.1 / 9.0 / 9.0.1 $B$*$h$S$=$l$i0JA0$K!"%G%#%l%/%H%j%H%i%P!<%5%k$r5v$97g4Y!#(B $B=$@5%W%m%0%i%`$,MQ0U$5$l$F$$$k!#(B CVE-2010-2861

$B!!4XO"(B: ColdFusion directory traversal FAQ (CVE-2010-2861) (gnucitizen.org, 2010.08.13)


$B"#(B 2010.08.13

$B"#(B About the security content of QuickTime 7.6.7
(Apple, 2010.08.13)

$B!!(BQuickTime 7.6.7 $BEP>l!#(BWindows $BHG$K$N$_B8:_$9$k!"(B $B96N,%`!<%S!<%U%!%$%k$K$h$C$FG$0U$N%3!<%I$,CVE-2010-1799


$B"#(B 2010.08.12

$B"#(B $BDI5-(B

$B!V(BJailbreakMe 2.0$B!W$,(BPDF$B%(%/%9%W%m%$%H$r;HMQ(B

$B"#(B Microsoft 2010 $BG/(B 8 $B7n$N%;%-%e%j%F%#>pJs(B
(Microsoft, 2010.08.11)

$B!!M=Dj$I$*$j=P$^$7$?!#(B($B$"$H$GDI5-$9$kM=Dj(B)

$B"#(B APSB10-16: Security update available for Adobe Flash Player
(Adobe, 2010.08.10)

$B!!(BFlash Player 10.1.82.76 / 9.0.280.0$B!"(BAIR 2.0.3 $BEP>l!#(B $B$=$l$h$jA0$NHG$K$O(B 6 $B7$/$b$N$,(B 5 $B$D!"%/%j%C%/%8%c%C%-%s%0$N0z6b$K$J$k$b$N$,(B 1 $B$D!#(B


$B"#(B 2010.08.10

$B"#(B $BDI5-(B

$B!V(BJailbreakMe 2.0$B!W$,(BPDF$B%(%/%9%W%m%$%H$r;HMQ(B

$B!!(BJailbreakme.com flaw not a PDF vulnerability (Sophos, 2010.08.04)

To date, Apple's security approach has only involved controlling applications in their store so they can provide a safe environment, but this incident could bring the perception of Apple as a virus-free platform to an end. If Apple does not design security into the platform, this incident may only be the tip of the proverbial iceberg.

$B!!$"$H!"Ev3:(B PDF $B%U%!%$%k$G(B Foxit Reader $B$,(B crash $B$9$k7o$K$D$$$F!"(B Foxit Reader 4.1.1.0805 $B$G=$@5$5$l$?$=$&$G$9!#(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2286198) Windows $B%7%'%k$N@H


$B"#(B 2010.08.09


$B"#(B 2010.08.06

$B"#(B APSB10-17: Security Advisory for Adobe Reader and Acrobat
(Adobe, 2010.08.05)

$B!!(BAdobe Reader / Acrobat 9.3.3 / 8.2.3 $B0JA0$KJ#?t$N7g4Y$,$"$j!"(B 2010.08.16 $B$N=5(B ($B$5Mh=5(B) $B$K99?7HG$rDjNc30%j%j!<%9$9$kM=Dj!#(B $B=$@5$5$l$k7g4Y$K$O!"(BBlack Hat USA 2010 $B$GH/I=$5$l$?!"(B [SA40766] Adobe Reader/Acrobat Font Parsing Integer Overflow Vulnerability (CVE-2010-2862) $B$b4^$^$l$k!#(B

2010.08.18 $BDI5-(B:

$B!!(BAPSB10-17 $B$,2~D{$5$l$?!#(B

Adobe expects to make these updates available on Thursday August 19, 2010.

$B!!JF9qF|IU$G$7$g$&$+$i!"F|K\;~4V$G$O(B 2010.08.20 $B$+$J!#(B

2010.08.24 $BDI5-(B:

$B!!(BAPSB10-17 $B$,:FEY2~D{$5$l$F$^$9!#(B $BM=Dj$I$*$j(B 2010.08.20 $B$K=P$^$7$?!#(BCVE-2010-2862 $B$NB>$K$b!"(B CVE-2010-1240 $B$,=$@5$5$l$F$$$k!#(B/Launch /Action $B$N7o!"7Y9p2hLL$NI=5-$N:>>N$KBP$9$k!"$5$i$J$kBP1~$NLOMM!#(B

$B"#(B Thunderbird 3.1.2 $B$r8x3+$7$^$7$?(B
(Mozilla Japan $B%V%m%0(B, 2010.08.06)

$B!!(BThunderbird 3.1.2 $BEP>l!#(B$B%j%j!<%9%N!<%H(B$B!#(B $B%;%-%e%j%F%#=$@5$O$J$$$_$?$$!#(B

$B"#(B $BDI5-(B

$B!V(BJailbreakMe 2.0$B!W$,(BPDF$B%(%/%9%W%m%$%H$r;HMQ(B

$B!!(BJailbreakme.com ($B$F$C$7!<$N4]=P$7(B, 2010.08.03)

$B"#(B $B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#>pJs$N;vA0DLCN(B - 2010 $BG/(B 8 $B7n(B
(Microsoft, 2010.08.06)

$B!!6[5^(B x 8$B!"=EMW(B x 6$B!#(BIE$B!"(BOffice$B!"(BSilverlight $B$"$j(B ($B$$$:$l$b!V6[5^!W(B)$B!#(BWord 2007 $B$K!V6[5^!W$,$D$$$F$^$9$h!#(B


$B"#(B 2010.08.05


$B"#(B 2010.08.04

$B"#(B $B!V(BJailbreakMe 2.0$B!W$,(BPDF$B%(%/%9%W%m%$%H$r;HMQ(B
($B%(%U%;%-%e%"%V%m%0(B, 2010.08.03)

$B!!(BJailbreakMe 2.0 $B$O(B PDF $B%U%!%$%k$G$"$j!"(BSafari $B$KFbB"$5$l$?(B PDF $B%S%e!<%"$N7g4Y$r96N,$7$F(B jailbreak $B$9$k!#(B $B$3$N7g4Y$N!"%^%k%&%'%"$X$N0-MQ$,7|G0$5$l$F$$$kLOMM!#(B

2010.08.06 $BDI5-(B:

$B!!(BJailbreakme.com ($B$F$C$7!<$N4]=P$7(B, 2010.08.03)

2010.08.10 $BDI5-(B:

$B!!(BJailbreakme.com flaw not a PDF vulnerability (Sophos, 2010.08.04)

To date, Apple's security approach has only involved controlling applications in their store so they can provide a safe environment, but this incident could bring the perception of Apple as a virus-free platform to an end. If Apple does not design security into the platform, this incident may only be the tip of the proverbial iceberg.

$B!!$"$H!"Ev3:(B PDF $B%U%!%$%k$G(B Foxit Reader $B$,(B crash $B$9$k7o$K$D$$$F!"(B Foxit Reader 4.1.1.0805 $B$G=$@5$5$l$?$=$&$G$9!#(B

2010.08.12 $BDI5-(B:

$B!!(BiOS $B=$@5HG=P$^$7$?!#(B

2010.08.18 $BDI5-(B:

$B!!(BiOS 4.0.2 / 3.2.2 $B$G=$@5$5$l$?7g4Y(B:

$B!!(BFreeType $B$NJ}$O(B iOS $B$K$H$I$^$i$J$$(B:

$B!!4XO"(B:


$B"#(B 2010.08.03

$B"#(B $BDI5-(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2286198) Windows $B%7%'%k$N@H


$B"#(B 2010.08.02

$B"#(B $B$$$m$$$m(B (2010.08.02)
(various)


$B"#(B 2010.08.01

$B"#(B Wireshark 1.2.10, 1.0.15, and 1.4.0rc2 Released
(Wireshark.org, 2010.07.29)

$B!!(BWireshark 1.2.10 / 1.0.15 $BEP>l!#(B2 $BCVE-2010-2287 CVE-2010-2284

$B"#(B $BDI5-(B

$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#(B $B%"%I%P%$%6%j(B (2286198) Windows $B%7%'%k$N@H


$B2a5n$N5-;v(B: 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998


[$B%;%-%e%j%F%#%[!<%k(B memo]
[$B;d$K$D$$$F(B]