$B%;%-%e%j%F%#%[!<%k(B memo

Last modified: Fri Mar 18 20:43:02 2011 +0900 (JST)
$BC;=L(B URL: http://goo.gl/pwSG$B!!(BQR $B%3!<%I(B: http://goo.gl/pwSG.qr


$B!!(BSecurity Watch $B$5$s$,E9$8$^$$$5$l$F$7$^$C$?$N$G!"(B $B8D?M$GDI$$$+$1$F$_$k%F%9%H$G$9!#(B $BHwK:O?$H$7$F=q$$$F$*$/$D$b$j$J$N$G!"(B Security Watch $B$5$s$N$h$&$J>\:Y$J$b$N$G$O$"$j$^$;$s!#(B $B4pK\E*$J%?!<%2%C%H$O(B UNIX$B!"(BWindows$B!"(BMac OS (priority $B=g(B) $B$H$7$^$9!#(B $B$^$?!"$3$N%Z!<%8$NFbMF$O$I$N%Z!<%8$K$bA}$7$FL5J]>Z$G$"$k$3$H$r@k8@$7$F$*$-$^$9!#A4$F$N>pJs$,=8$^$C$F$$$k$o$1$b$"$j$^$;$s!#(B

$B!!$3$3$K:\$;$k>pJs$K$D$$$F$O!"2DG=$J8B$j(B 1 $BpJs8;$X$N%j%s%/$r:n@.$7$F$*$-$^$9!#(B $B3F<+$G(B 1 $BpJs8;$NFbMF$r3NG'$7$F$/$@$5$$!#(B $B$3$N%Z!<%8$NFbMF$r$/$l$0$l$b1-0{$_$K$7$J$$$h$&$K!#(B $B4V0c$$$rH/8+$5$l$?J}!"5-:\$5$l$F$$$J$$>pJs$r$4B8CN$NJ}!"$<$R(B$B$*$7$($F$/$@$5$$(B$B!#$h$m$7$/$*4j$$$$$?$7$^$9!#(B

$B!!$3$N%Z!<%8$N>pJs$rMxMQ$5$l$kA0$K!"(B$BCm0U=q$-(B$B$r$*FI$_$/$@$5$$!#(B


$B!!(B[ $BDjHV>pJs8;(B ] $B!!2a5n$N5-;v(B: 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998


[SCAN Security Wire NP Prize 2001]

$B!V(BScan Security Wire$B!W(B $BSCAN Security Wire NP Prize 2001 $B$r^(B$B$7$^$7$?!#(B

$B!!(B

$B!V%M%C%H%i%s%J!o=,^$r!"%Y%9%H!&%*%V!&>o=,^$r^$7$^$7$?!#(B


www.iraqbodycount.org www.iraqbodycount.org

$BI|4)%j%/%(%9%H
$B%8%'%$%`%:(B.$B#F(B.$B%@%K%,%s!V(B $B?7!&@oAh$N%F%/%N%m%8!<(B$B!W(B($B8=:_(B45$BI<(B)
$BCf;3?.90!V(B$B%=%U%H%&%'%"$NK!E*J]8n(B$B!W(B ($B8=:_(B119$BI<(B) ($B%*%s%G%^%s%I9XF~2D(B)
$BN&0f;0O:Lu!&JT!V(B$B%Y%H%J%`5"4TJ<$N>Z8@(B$B!W(B ($B8=:_(B109$BI<(B)
$BNS9nL@!V(B$B%+%U%+%9$N>.$5$J9q!!%A%'%A%'%sFHN)1?F0;OKv(B$B!W(B ($B8=:_(B172$BI<(B)
$B2f$i9_Iz$;$:!]%5%$%Q%s6L:U@o$N685$$H?? ($B8=:_(B111$BI<(B)

RSS $B$KBP1~$7$F$_$^$7$?!#(B $B>.%M%?$O4^$^$l$F$$$^$;$s!#!V@/<#$M$?%&%<%'!W$H$$$&?M$O(B RSS $B%Y!<%9$GFI$`$H9,$;$K$J$l$k$G$7$g$&(B ($B%&%6$/$J$$?M$O(B $B$3$C$A$N(B RSS $B$,$h$$$+$b$7$l$^$;$s(B)$B!#(B RSS 1.0 $B$G$9$N$G!"$"$/$^$G(B RDF Site Summary $B$G$9!#(B $B8=:_$O(B Really Simple Syndication $B$K$OBP1~$7$F$$$^$;$s!#(B
$B:#$9$0(B Really Simple Syndication $B$,$[$7$$?M$O!"$N$$$s$5$s$K$h$k(B Web $B%5%$%H$N(B RSS $B$r>! $B$r;2>H$7$F$/$@$5$$!#(B($B$N$$$s$5$s>pJs$"$j$,$H$&$4$6$$$^$9(B)

$B<BMQ(B SSH $BBh(B2$BHG(B: $B%;%-%e%
2 $B:~$,=P$^$7$?!#(B$B%*%i%$%j!<$GCmJ8$7(B$B!"Hw9MMw$K!VI,$:(B2$B:~$G$"$k$3$H!W$H=q$/$H(B 2 $B:~$r3N

$B"#(B 2011.03.18

$B"#(B Windows Vista/7$B$K$*$1$k(BISATAP$B%k!<%?!<<+F0H/8+J}<0$N@H
(JPRS, 2011.03.17)

$B!!(BWindows Vista / 7 $B$K$*$1$k(B ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) $B$NA0$N%[%9%H$rC5$9$N$@$,!"(BWindows Vista / 7 $B$G$O<+F0E*$KBh(B3$B%l%Y%k%I%a%$%sL>$^$G8!:w$7$F$7$^$&$?$a!"<+%I%a%$%s30$N%5%$%H$,;2>H$5$l$F$7$^$&62$l$,$"$k!#(B

$B!!=$@5%W%m%0%i%`$O$J$$!#%/%i%$%"%s%HB&$G$N@_Dj$K$h$k2sHr$b$G$-$J$$!#(BDNS $B%5!<%P$d%I%a%$%sL>4IM}B&$GBP1~$9$kI,MW$,$"$k!#(B

$B"#(B $BDI5-(B

Microsoft 2011 $BG/(B 3 $B7n$N%;%-%e%j%F%#>pJs(B

APSA11-01: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

$B!!4XO"(B:

  • Adobe$B$N%<%m%G%$@H ($B%H%l%s%I%^%$%/%m(B $B%;%-%e%j%F%#(B blog, 2011.03.18)

  • $BCO?L!"DEGH!"86H/!"@aEE$J$I$N%U%!%$%kL>$NIT@5%W%m%0%i%`$,9qFb$GN.DL(B ($B%H%l%s%I%^%$%/%m(B $B%;%-%e%j%F%#(B blog, 2011.03.18)

  • A Technical Analysis on the CVE-2011-0609 Adobe Flash Player Vulnerability (Microsoft Malware Protection Center, 2011.03.17)

  • Blocking Exploit Attempts of the Recent Flash 0-Day (Microsoft Security Research & Defense, 2011.03.17)$B!#(BEMET $B$r;H$&$H8z2L$,$"$k!#(BOffice <= 2007 $B$N>l9g$OFC$K8z2L$,$"$j!"(BOffice 2010 $B$N>l9g$b8z2L$,$"$k!#(B

    For users who want additional protections as well as users of Microsoft Office prior to 2010, the Enhanced Mitigation Experience Toolkit (EMET) can help. Turning on EMET for the core Office applications will enable a number of security protections called security mitigations. The exploits we$B!G(Bve seen so far are broken by three of these mitigations: DEP, Export Address Table Access filtering (EAF), and HeapSpray pre-allocation. EMET is of value even to Microsoft Office 2010 as it has the first of the three enabled by default, but does not have the second or third ones.

    $B!!$^$?!"(BOffice 2007 $B$N>l9g$O!"(BOffice $B%"%W%j$+$i$N(B Flash Player $B$N5/F0$rKI;_$9$k$h$&@_Dj$9$k$3$H$b8z2L$,$"$k!#(B

    Beyond EMET, there is a workaround that Office 2007 users can use to prevent the Flash Player (as well as other ActiveX controls) from loading inside an Office application. This is done by changing the ActiveX setting in the Trusted Center to $B!H(BDisable all controls without notification$B!I(B as is shown in the screenshot below.

    $B!!@_DjJ}K!(B (Excel 2007 $B$NNc(B)

    1. [Office $B%\%?%s(B] $B"*(B [Excel $B$N%*%W%7%g%s(B] $B$r%/%j%C%/!#!V(BExcel $B$N%*%W%7%g%s!W%&%#%s%I%&$,I=<($5$l$k!#(B

    2. $B!V(BExcel $B$N%*%W%7%g%s!W%&%#%s%I%&$G!"(B[$B%;%-%e%j%F%#(B $B%;%s%?!<(B] $B%?%V$N(B [$B%;%-%e%j%F%#(B $B%;%s%?!<$N@_Dj(B] $B$r%/%j%C%/!#!V%;%-%e%j%F%#(B $B%;%s%?!

    3. $B!V%;%-%e%j%F%#(B $B%;%s%?!


$B"#(B 2011.03.17

$B"#(B $BDI5-(B

APSA11-01: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

$B!!(BGoogle Chrome $BFbB"$N(B Flash Player $B$O(B Google Chrome 10.0.648.134 $B$G0lB-Aa$/=$@5$5$l$^$7$?!#(BStable and Beta Channel Updates (Google Chrome Release Blog, 2011.03.15)

$B!!%^%k%&%'%"(B: Excel File Containing Adobe Zero-Day Exploit Found (trendmicro blog, 2011.03.16)


$B"#(B 2011.03.16

$B"#(B $BDI5-(B


$B"#(B 2011.03.15

$B"#(B APSA11-01: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat
(Adobe, 2011.03.14)

$B!!(BWindows / Mac / Linux / Solaris $BMQ(B Adobe Flash Player 10.2.152.33 $B0JA0(B (Chrome $B$N>l9g$O(B 10.2.154.18 $B0JA0(B)$B!"(BAndroid $BMQ(B Adobe Flash Player 10.1.106.16 $B0JA0!"(B $B$*$h$S!"(B Windows / Mac $BHG$N(B Adobe Reader / Acrobat 10.x / 9.x $B$K4^$^$l$k(B Authplay.dll $B$KCWL?E*$J7g4Y$,$"$j!"96N,(B SWF $B%U%!%$%k$K$h$C$FG$0U$N%3!<%I$,CVE-2011-0609

$B!!(BUNIX $BHG$N(B Adobe Reader 9.x, Android $BHG$N(B Adobe Reader$B!"(BAdobe Reader / Acrobat 8.x $B$K$O$3$N7g4Y$O$J$$!#(B

$B!!=$@5HG$O8=:_3+H/(BCf$G$"$j!"Flash Player$B!"(BAcrobat$B!"(BMac $BMQ(B Adobe Reader X$B!"(BWindows / Mac $BMQ(B Adobe Reader 9.x $B$K$D$$$F$O(B 2011.03.21 $B$N=5$K8x3+$5$l$kM=Dj!#(B Windows $BMQ(B Adobe Reader X $B$K$D$$$F$O!"(BProtected Mode $B$K$h$C$F967b$rGS=|$G$-$k$H9M$($i$l$k$3$H$+$i!"

$B!!4XO"(B: Background on APSA11-01 Patch Schedule (Adobe blog, 2011.03.14)

2011.03.16 $BDI5-(B:

$B!!F|K\8l>6LuHG$,=P$F$$$^$9(B: APSA11-01: Flash Player$B!"(BAdobe Reader $B$*$h$S(B Acrobat $B$K4X$9$k%;%-%e%j%F%#>pJs(B (Adobe)

2011.03.17 $BDI5-(B:

$B!!(BGoogle Chrome $BFbB"$N(B Flash Player $B$O(B Google Chrome 10.0.648.134 $B$G0lB-Aa$/=$@5$5$l$^$7$?!#(BStable and Beta Channel Updates (Google Chrome Release Blog, 2011.03.15)

$B!!%^%k%&%'%"(B: Excel File Containing Adobe Zero-Day Exploit Found (trendmicro blog, 2011.03.16)

2011.03.18 $BDI5-(B:

$B!!4XO"(B:

  • Adobe$B$N%<%m%G%$@H ($B%H%l%s%I%^%$%/%m(B $B%;%-%e%j%F%#(B blog, 2011.03.18)

  • $BCO?L!"DEGH!"86H/!"@aEE$J$I$N%U%!%$%kL>$NIT@5%W%m%0%i%`$,9qFb$GN.DL(B ($B%H%l%s%I%^%$%/%m(B $B%;%-%e%j%F%#(B blog, 2011.03.18)

  • A Technical Analysis on the CVE-2011-0609 Adobe Flash Player Vulnerability (Microsoft Malware Protection Center, 2011.03.17)

  • Blocking Exploit Attempts of the Recent Flash 0-Day (Microsoft Security Research & Defense, 2011.03.17)$B!#(BEMET $B$r;H$&$H8z2L$,$"$k!#(BOffice <= 2007 $B$N>l9g$OFC$K8z2L$,$"$j!"(BOffice 2010 $B$N>l9g$b8z2L$,$"$k!#(B

    For users who want additional protections as well as users of Microsoft Office prior to 2010, the Enhanced Mitigation Experience Toolkit (EMET) can help. Turning on EMET for the core Office applications will enable a number of security protections called security mitigations. The exploits we$B!G(Bve seen so far are broken by three of these mitigations: DEP, Export Address Table Access filtering (EAF), and HeapSpray pre-allocation. EMET is of value even to Microsoft Office 2010 as it has the first of the three enabled by default, but does not have the second or third ones.

    $B!!$^$?!"(BOffice 2007 $B$N>l9g$O!"(BOffice $B%"%W%j$+$i$N(B Flash Player $B$N5/F0$rKI;_$9$k$h$&@_Dj$9$k$3$H$b8z2L$,$"$k!#(B

    Beyond EMET, there is a workaround that Office 2007 users can use to prevent the Flash Player (as well as other ActiveX controls) from loading inside an Office application. This is done by changing the ActiveX setting in the Trusted Center to $B!H(BDisable all controls without notification$B!I(B as is shown in the screenshot below.

    $B!!@_DjJ}K!(B (Excel 2007 $B$NNc(B)

    1. [Office $B%\%?%s(B] $B"*(B [Excel $B$N%*%W%7%g%s(B] $B$r%/%j%C%/!#!V(BExcel $B$N%*%W%7%g%s!W%&%#%s%I%&$,I=<($5$l$k!#(B

    2. $B!V(BExcel $B$N%*%W%7%g%s!W%&%#%s%I%&$G!"(B[$B%;%-%e%j%F%#(B $B%;%s%?!<(B] $B%?%V$N(B [$B%;%-%e%j%F%#(B $B%;%s%?!<$N@_Dj(B] $B$r%/%j%C%/!#!V%;%-%e%j%F%#(B $B%;%s%?!

    3. $B!V%;%-%e%j%F%#(B $B%;%s%?!

$B"#(B $B$$$m$$$m(B (2011.03.15)
(various)


$B"#(B 2011.03.14

$B"#(B $BDI5-(B


$B"#(B 2011.03.13


$B"#(B 2011.03.12


$B"#(B 2011.03.11

$B"#(B $BDI5-(B

Microsoft 2011 $BG/(B 3 $B7n$N%;%-%e%j%F%#>pJs(B

$B!!(Bcadz $B$5$s$+$i(B ($B>pJs$"$j$,$H$&$4$6$$$^$9(B)

MS11-015 $B$N5-=R$G$9$,!";d$N(BXPHomeSP3$B4D6-$G$O(BWindowsUpdate$B$G(B(KB2479943)$B$H$7$F9_$j$F$-$^$7$?!#(B

$B%j%s%/@h$N(B http://www.microsoft.com/japan/technet/security/bulletin/MS11-015.mspx $B$N!X1F6A$r $B$I$A$i$+$@$H;W$$$^$9$,!"

$B"#(B 2011.03.10

$B"#(B About the security content of Apple TV 4.2
(Apple, 2011.03.09)

$B!!(BApple TV 4.2 $BEP>l!#(B4 $B7o$N7g4Y$,=$@5$5$l$F$$$k!#(B

$B"#(B About the security content of Safari 5.0.4
(Apple, 2011.03.09)

$B!!(BSafari 5.0.4 $BEP>l!#(B62 $B7o$N7g4Y$,=$@5$5$l$F$$$k!#(B

$B!!(BSafari 5.0.3 / Mac OS X 10.6.6 $B$O(B pwn2own day one: Safari, IE8 fall, Chrome unchallenged (arstechnica, 2011.03.09) $B$G=V;&$@$C$?$h$&$G$9$,!"(BSafari 5.0.4 $B$J$i$I$&$C$?$s$G$7$g$&$M!#(B

$B"#(B About the security content of iOS 4.3
(Apple, 2011.03.09)

$B!!(BiOS 4.3 $BEP>l!#(B59 $B7o$N7g4Y$,=$@5$5$l$F$$$k!#(B

$B"#(B VU#555316: STARTTLS plaintext command injection vulnerability
(US-CERT, 2011.03.07)

$B!!J#?t$N(B STARTTLS $Bl9g$O!"(BTLS $B$X$N0\9T8eD>$A$K(B IO $B%P%C%U%!$rGK4~$7$J$1$l$P$J$i$J$$!#(BCVE-2011-0411

$B!!A4$F$N(B STARTTLS $B

$B!!4XO"(B: JVNVU#555316: $BJ#?t$N(B STARTTLS $B (JVN)

2011.03.14 $BDI5-(B:

$B!!(BPlaintext injection in STARTTLS (multiple implementations) (Wietse Venema, 2011.03.08)

$B"#(B $B$$$m$$$m(B (2011.03.10)
(various)


$B"#(B 2011.03.09

$B"#(B Microsoft 2011 $BG/(B 3 $B7n$N%;%-%e%j%F%#>pJs(B
(Microsoft, 2011.03.09)

MS11-015 - $B6[5^(B: Windows Media $B$N@H

$B!!(BWindows XP / Vista / 7 / Server 2008 R2 $B$K(B 2 $B$D$N7g4Y!#(B $B$?$@$7(B XP Home Edition / Tablet PC Edition$B!"(B Server 2008 R2 for Itanium-based Systems $B$O=|$/!#(B

MS11-016 - $B=EMW(B: Microsoft Groove $B$N@H

MS11-017 - $B=EMW(B: $B%j%b!<%H(B $B%G%9%/%H%C%W(B $B%/%i%$%"%s%H$N@H

$B!!(BWindows XP / Server 2003 / Vista / Server 2008 / 7 / Server 2008 R2 $B$K7g4Y!#(B Windows $B%j%b!<%H%G%9%/%H%C%W%/%i%$%"%s%H(B 5.2 / 6.0 / 6.1 / 7.0 $B$K(B DLL $BFI$_9~$_$K4X$9$k@H$B$,$"$k!#(BCVE-2011-0029

$B!!$?$@$7!"(BWindows XP x64$B!"(BServer 2003 SP2$B!"(B7 SP1$B!"(BServer 2008 R2 SP1 $B$K$O$3$N7g4Y$O$J$$!#(B

$B!!$J$*!"99?7%W%m%0%i%`$rE,MQ$9$k$H!"%9%?!<%H%a%K%e!<$N%7%g!<%H%+%C%H$,1Q8lI=<($K$J$k$J$I$NLdBj$,H/@8$9$k$3$H$,$"$k!#(BKB2508062 $B;2>H!#(B

2011.03.11 $BDI5-(B:

$B!!(Bcadz $B$5$s$+$i(B ($B>pJs$"$j$,$H$&$4$6$$$^$9(B)

MS11-015 $B$N5-=R$G$9$,!";d$N(BXPHomeSP3$B4D6-$G$O(BWindowsUpdate$B$G(B(KB2479943)$B$H$7$F9_$j$F$-$^$7$?!#(B

$B%j%s%/@h$N(B http://www.microsoft.com/japan/technet/security/bulletin/MS11-015.mspx $B$N!X1F6A$r $B$I$A$i$+$@$H;W$$$^$9$,!"

2011.03.18 $BDI5-(B:

$B!!(BMS11-015 - $B6[5^(B: Windows Media $B$N@H $B$,(B 2011.03.17 $BIU$G2~D{$5$l$?!#(B XP Home Edition / Tablet PC Edition $B$O7g4Y$NBP>]$G$"$j!"G[I[$5$l$F$$$k=$@5%W%m%0%i%`$K$*$$$F$bEv=i$+$i7g4Y$NBP>]$H$J$C$F$$$?$H!#(Bcadz $B$5$s$+$i$N>pJs$,N"IU$1$i$l$?7A!#(B

$B"#(B $BDI5-(B

February 2011 Java SE and Java for Business Critical Patch Update Released

$B!!(BJava SE 6 Update 24 $B$KBP1~$9$k(B Mac OS X $BMQ(B Java $B$,EP>l(B:

$B!!(BMac OS X $BMxMQ

$B"#(B Google Chrome Stable Release
(Google Chrome Relase Blog, 2011.03.08)

$B!!(BGoogle Chrome 10.0.648.127 $BEP>l!#(B23 $B7o$N7g4Y$,=$@5$5$l$F$$$k!#(B


$B"#(B 2011.03.08


$B"#(B 2011.03.07


$B"#(B 2011.03.06

$B"#(B $BDI5-(B

Firefox 3.6.14 / 3.5.17$B!"(BThunderbird 3.1.8 $B8x3+(B ($B%;%-%e%j%F%#99?7(B)

$B!!(BFirefox 3.6.14 / Thunderbird 3.1.18 $B$K$OIT6q9g$,$"$C$?$=$&$G!"(BFirefox 3.6.15 / Thunderbird 3.1.19 $B$,=P$F$$$^$9!#(BFirefox 3.5.17 $B$K$O$3$NIT6q9g$O$"$j$^$;$s!#(B


$B"#(B 2011.03.04

$B"#(B $BDI5-(B

$B"#(B $B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#>pJs$N;vA0DLCN(B - 2011 $BG/(B 3 $B7n(B
(Microsoft, 2011.03.04)

$B!!:#7n$O6[5^(B x 1$B!"=EMW(B x 2 $B$,M=Dj$5$l$F$$$^$9!#(BWindows x 2$B!"(BOffice x 1 (Microsoft Groove 2007)$B!#(B

$B"#(B qmail/netqmail$B$K$*$1$k(B512$B%P%$%H$rD6$($k(BDNS$B1~Ez$NITE,@Z$J
(JPRS, 2011.03.03)

$B!!(Bqmail/netqmail $B$O(B 512 $B%P%$%H$r1[$($k(B DNS $B1~Ez$r$-$A$s$H07$($J$$$N$G(B http://www.ckdhr.com/ckd/qmail-103.patch $B$rE,MQ$7$F$/$@$5$$$M!"$H$$$&OC!#(BFreeBSD $B$N(B ports/mail/qmail $B$K$O$3$N(B patch $B$O4^$^$l$F$$$k$h$&$G$9!#4XO"(B: qmail $B$O%*%o%3%s(B ($B$I$5$K$C$-(B 3D $B!A(B2011$BG/(B2$B7n>e=\!A(B, 2011.02.07)

$B$D!<$3$H$G!"$?$$$X$sITK\0U$J$,$i(B life with qmail $B$NK]Lu(B$B$KLuCm$rDI2C!#$[$s$H$@$C$?$i!V$$$$$+$2$s$B:GDc8BI,MW$J%Q%C%A(B$B$rE,MQ$7$F$$$k$+3NG'$7$F!"$^$@$@$C$?$i%3%s%Q%$%k$7$J$*$7$F$/$@$5$$!#$*$l(B qmail $B$8$c$J$/$F(B netqmail $B$@$b$s$M!e$?$C$F$b$_$s$J$^$@J|CV$7$F$k$s$+$M!#(B
$B:G6a$G$O(B SPF $B$,$+$J$jIa5Z$7$FBg$-$J(B TXT $B%l%3!<%I$r;}$D%I%a%$%s$bA}$($?$7!"2?$h$j7hDjE*$J$N$,(B DNSSEC$B!#$3$l$KBP1~$7$F$$$k%I%a%$%s$K(B ANY $B$GLd$$9g$o$;$k$H!"(B(DNSSEC $BHsBP1~$J%-%c%C%7%e%5!<%P$+$i$NLd$$9g$o$;$G$"$C$F$b(B)$B$[$\3NCO$b$J$/(B qmail$B!#(BDNSSEC $B$d(B SPF $B$,Ia5Z$7$?$N$OHf3SE*:G6a$@$1$I!"(BDNS $B1~Ez$,(B512$B%P%$%H0J>e$K$O$J$i$J$$!"$J$s$F$N$O(B qmail $B$,=P$?(B13$BG/A0$G$9$i%&%=$@$C$?$s$@$+$i!#(B

$B"#(B 2011.03.03

$B"#(B About the security content of iTunes 10.2
(Apple, 2011.03.02)

$B!!(BiTunes 10.2 $BEP>l!#(B

  • Windows $BHG(B: iTunes $B$,;HMQ$7$F$$$k%=%U%H%&%'%"%3%s%]!<%M%s%H(B (ImageIO$B!"(Blibxml$B!"(BWebKit) $B$K4^$^$l$F$$$?BgNL$N7g4Y$,=$@5$5$l$F$$$k!#(B

  • Mac OS X $BHG(B: $B%;%-%e%j%F%#=$@5$O$J$$!#(BWindows $BHG$KAjEv$9$k=$@5(B (ImageIO $B$N(B libpng $B%"%C%W%0%l!<%I(B) $B$O!"(B Mac OS X v10.6.5 and Security Update 2010-007 $B$K$*$$$F


$B"#(B 2011.03.02

$B"#(B Firefox 3.6.14 / 3.5.17$B!"(BThunderbird 3.1.8 $B8x3+(B ($B%;%-%e%j%F%#99?7(B)
(mozilla.jp, 2011.03.02)

$B!!(BFirefox 3.6.14 / 3.5.17$B!"(BThunderbird 3.1.8 $B8x3+$5$l$F$$$^$9!#(B

$B!!J#?t$N7g4Y$O(B SeaMonkey $B$K$b1F6A$7!"(BSeaMonkey 2.0.12 $B$G=$@5$5$l$^$9!#(BSeaMonkey 2.0.12 $B$O$^$b$J$/8x3+$5$l$k$b$N$H;W$o$l$^$9!#(B

$B!!$J$*!"(BThunderbird 3.0 $B7ONs$N%a%s%F%J%s%9$O=*N;$7$F$$$^$9!#(BThunderbird 3.1.8 $B$K%"%C%W%0%l!<%I$7$F$/$@$5$$!#(B

$B!!(BFirefox 3.5 $B7ONs$N%a%s%F%J%s%9$C$F$$$D$^$GB3$/$s$@$m$&!D!D!#(B http://mozilla.jp/firefox/download/older/ $B$K$O$3$s$J$U$&$K=q$+$l$F$$$k$1$I!#(B

Firefox 3.5 $B$N%5%]!<%H(B ($B%;%-%e%j%F%#%"%C%W%G!<%H$NDs6!(B) $B$O(B 2010 $BG/(B 8 $B7n$G=*N;M=Dj$G$7$?!#8=:_$N1dD9%5%]!<%H$OM=9p$J$/=*N;$9$k2DG=@-$,$"$j$^$9!#$9$Y$F$N%f!<%6$K(B Firefox 3.6.14 $B$X$N99?7$r6/$/?d>)$7$^$9!#(B

2011.03.06 $BDI5-(B:

$B!!(BFirefox 3.6.14 / Thunderbird 3.1.18 $B$K$OIT6q9g$,$"$C$?$=$&$G!"(BFirefox 3.6.15 / Thunderbird 3.1.19 $B$,=P$F$$$^$9!#(BFirefox 3.5.17 $B$K$O$3$NIT6q9g$O$"$j$^$;$s!#(B


$B"#(B 2011.03.01

$B"#(B $B$$$m$$$m(B (2011.03.01)
(various)

$B"#(B [Announce] Samba 3.5.7, 3.4.12 and 3.3.15 Security Releases Available
(Samba.org, 2011.02.28)

$B!!A4$F$N%j%j!<%9HG(B samba $B$K7g4Y!#%U%!%$%k5-=R;R$NHO0O%A%'%C%/$,9T$o$l$F$$$J$$$?$a!"(Bremote $B$+$i%a%b%jGK2u$K$h$k(B DoS $B967b$,2DG=!#(B CVE-2011-0719

$B!!(BSamba 3.5.7 / 3.4.12 / 3.3.15 $B$G=$@5$5$l$F$$$k!#(B

$B"#(B Google Chrome Stable Channel Update
(Google Chrome Relase Blog, 2011.02.28)

$B!!(BGoogle Chrome 9.0.597.107 $BEP>l!#(B18 $B7o$N7g4Y$,=$@5$5$l$F$$$k!#(B


$B2a5n$N5-;v(B: 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998


[$B%;%-%e%j%F%#%[!<%k(B memo]