$B@>B<(b@$b%i%c%/$g$9!#(b SecurityFocus Newsletter $BBh(B 260 $B9f$NOBLu$r$*FO$1$7$^$9!#(B $BLu$N$J$$9`L\$K$D$$$F$O!VF|K\8lLu$J$7!W$H$7$F6hJL$7$F$"$j$^$9!#(B --------------------------------------------------------------------------- BugTraq-JP $B$K4X$9$k(B FAQ($BF|K\8l(B): http://www.securityfocus.com/popups/forums/bugtraq-jp/faq.shtml $B!&(BSecurityFocus Newsletter $B$NOBLu$O(B BugTraq-JP $B$G0lH$/$@$5$$(B --------------------------------------------------------------------------- --------------------------------------------------------------------------- SecurityFocus Newsletter $B$K4X$9$k(BFAQ($B1Q8l(B): http://www.securityfocus.com/popups/forums/securityfocusnews/intro.shtml BugTraq $B$K4X$9$k(B FAQ($B1Q8l(B): http://www.securityfocus.com/popups/forums/bugtraq/faq.shtml --------------------------------------------------------------------------- $B0zMQ$K4X$9$kHw9M(B: $B!&$3$NOBLu$O(B SecurityFocus $B$N5v2D$r3t<02qe$G9T$o$l$F$$$^$9!#(B $B!&(BSecurityFocus Newsletter $B$NOBLu$r(B Netnews, Mailinglist, World Wide Web, $B=q@R(B, $B$=$NB>$N5-O?G^BN$G0zMQ$5$l$k>l9g$K$O%a!<%k$na4j80zmq$r$*4j$$$7$^$9!#(b $B!&F|K\8lHG%K%e!<%9%l%?!<(b 1 $B9f$+$i(B 3 $B9f$^$G$K$O$3$NHw9M$,IU$$$F$$$^$;$s$,!"(B $B=`MQ$9$k$b$N$H$7$^$9!#(B $B!&$^$?!"(BSecurityFocus $BDs6!$N(B BugTraq-JP $B%"!<%+%$%v(b [*1] $B$X$N$$$+$J$k7A<0$n(b $B%O%$%Q!<%j%s%/$b>e5-$K=`$8$F$/$@$5$$!#(B 1) http://online.securityfocus.com/archive/79 --------------------------------------------------------------------------- $B$3$NOBLu$K4X$9$kHw9M(B: $B!&$3$NOBLu$NE,MQ@.2L$K$D$$$F3t<02q l9g!"(BBugTraq-JP $B$X(B Errata $B$H$7$F=$@5(B $BHG$r$4Ej9FD:$/$+!"4F=$ l9g$K$O=$@5HG$r$G$-$k$@$1?WB.$KH/9T$7$^$9!#(B --------------------------------------------------------------------------- This translation is encoded and posted in ISO-2022-JP. $B86HG(B: Date: 3 Aug 2004 21:28:13 -0000 Message-ID: <20040803212813.29015.qmail@xxxxxxxxxxxxxxxxxxxxxx> SecurityFocus Newsletter #260 ----------------------------- This Issue is Sponsored By: SecurityFocus I. FRONT AND CENTER($BF|K\8lLu$J$7(B) 1. Data Driven Attacks Using HTTP Tunneling 2. Email Privacy is Lost II. BUGTRAQ SUMMARY 1. EasyWeb FileManager Module Directory Traversal Vulnerability 2. PostNuke Install Script Administrator Password Disclosure Vu... 3. eSeSIX Thintune Thin Client Devices Multiple Vulnerabilities 4. EasyIns Stadtportal Site Parameter Remote File Include Vulne... 5. Mozilla Firefox Refresh Security Property Spoofing Vulnerabi... 6. Pavuk Remote Digest Authentication Buffer Overflow Vulnerabi... 7. Nucleus CMS Action.PHP SQL Injection Vulnerability 8. XLineSoft ASPRunner Multiple Vulnerabilities 9. Subversion 'mod_authz_svn' Access Control Bypass Vulnerabili... 10. MoinMoin PageEditor Unspecified Privilege Escalation Vulnera... 11. PostNuke Reviews Module Cross-Site Scripting Vulnerability 12. Dropbear SSH Server Digital Signature Standard Unspecified A... 13. Invision Power Board Index.php Query String Cross-Site Scrip... 14. MoinMoin Unspecified Privilege Escalation Vulnerability 15. Apple Mac OSX Internet Connect Insecure Temporary File Handl... 16. OpenDocMan Access Control Bypass Vulnerability 17. Zero G InstallAnywhere Insecure Temporary File Creation Vuln... 18. Opera Web Browser Location Replace URI Obfuscation Weakness 19. Unreal IRCD Multiple Vulnerabilities 20. RiSearch/RiSearch Pro Open Proxy Vulnerability 21. phpMyFAQ Image Manager Authentication Bypass Vulnerability 22. FTPGlide Insecure Local Profile Storage Vulnerability 23. Microsoft Internet Explorer Style Tag Comment Memory Corrupt... 24. Hitachi Web Page Generator Unspecified Denial Of Service Vul... 25. Hitachi Web Page Generator Cross-Site Scripting and Informat... 26. SoX WAV File Buffer Overflow Vulnerability 27. Check Point VPN-1 ASN.1 Buffer Overflow Vulnerability 28. AntiBoard Multiple Input Validation Vulnerabilities 29. Phorum Search Script Cross-Site Scripting Vulnerability 30. DansGuardian Hex Encoded File Extension URI Content Filter B... 31. Comersus Cart SQL Injection Vulnerability 32. Verylost LostBook Message Entry HTML Injection Vulnerability 33. JAWS ControlPanel.PHP SQL Injection Vulnerability 34. LinPHA Session Cookie SQL Injection Vulnerability 35. Oracle Database Default Library Directory Privilege Escalati... 36. OpenFTPD Remote Message Format String Vulnerability 37. MyServer Multiple Remote math_sum.mscgi Example Script Vulne... 38. Mozilla Firefox XML User Interface Language Browser Interfac... 39. Citadel/UX Username Buffer Overflow Vulnerability 40. SapporoWorks Black JumboDog FTP Server Buffer Overflow Vulne... 41. PowerPortal Private Message HTML Injection Vulnerability 42. FusionPHP Fusion News Administrator Command Execution Vulner... III. SECURITYFOCUS NEWS ARTICLES 1. ATM keypads get a security boost 2. Companies adapt to a zero day world 3. VoIP hacks gut Caller I.D. 4. Anti-spam spamvertisers agree to quit 5. Mozilla to pay bounty on bugs 6. Singapore holds computer hacking contest to find city-state'... IV. SECURITYFOCUS TOP 6 TOOLS 1. DiskLogon 1.0.17.112 2. UndeleteSMS 1.0 3. Macshift 1.0 4. Advanced LAN Scanner 1.0 5. Firewall Builder 2.0 6. Lepton's Crack 20031130 I. FRONT AND CENTER($BF|K\8lLu$J$7(B) --------------------------------- II. BUGTRAQ SUMMARY ------------------- 1. EasyWeb FileManager Module Directory Traversal Vulnerability BugTraq ID: 10792 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 23 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10792 $B$^$H$a(B: EasyWeb $B$O!"%G%#%l%/%H%j$N;2>H$K4X$9$kLdBj$rJz$($F$$$k5?$$$,$"$k!#$3$NLd(B $BBj$O!"%f!<%6$,m?$($k%g!<%?$kbp$9$kl5322=$,it==j,$g$"$k$3$h$k5/0x$9$k!#$3(b $B$NLdBj$O!"%j%b!<%h$n967b H$K4X$9(B $B$kJ8;zNs$r4^$`%U%!%$%k$X$N%j%/%(%9%H$r!"(B'ew_filemanager' $B%9%/%j%W%H$KAw(B $B?.$9$k$3$H$GH/@8$9$k!#(B EasyWeb FileManager 1.0 RC-1 $B$O!"$3$NLdBj$rJz$($F$$$k5?$$$,$"$k!#(B $B99?7(B:EasyWeb $B4IM} ZL@=q$r;}$C$?967b pJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10793 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BPostNuke $B$O%j%b!<%h$n967b ZMQ>pJs$r3+<($9$k(b $B2DG=@-$,$"$k!#$3$NLdBj$O!"$3$N%=%U%H%&%'%"$N%$%s%9%H!<%k8e$k!"%$%s%9%h!<(b $B%k%9%/%j%W%H$G$"$k(B 'install.php' $B$r:o=|$7$J$$$3$H$K5/0x$9$k!#$3$NLdBj$K(B $B$h$j!"967b $N%f!<%6(b $B$d1F6A$rhttp://www.securityfocus.com/bid/10794 $B$^$H$a(B: Thintune $B$N(B Linux $B$GMxMQ$9$k%G%P%$%9$K$O!"J#?t$NLdBj$,B8:_$9$k5?$$$,$"$k(B $B$HJs9p$5$l$F$$$k!#$3$l$i$NLdBj$K$h$j!"%j%b!<%h$n967b pJsO31L$NLdBj$r4^$s$G$$(B $B$k!#(B $B%U%!!<%`%&%'%"(b 2.4.38 $B0JA0$N(B Thintune $B%G%P%$%9$,!"$3$l$i$NLdBj$K$h$k1F6A(B $B$re$G2TF0$9$k(B Thintune $B%G%P%$%9$O!"$3(B $B$NLdBj$K1F6A$5$l$J$$!#(B 4. EasyIns Stadtportal Site Parameter Remote File Include Vulne... BugTraq ID: 10795 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 24 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10795 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BEasyIns Stadtportal $B$K$O!"967b e$G $N%P!<%8%g%s$bf1mm$k1f6a$rhttp://www.securityfocus.com/bid/10796 $B$^$H$a(B: Mozilla Firefox $B$O!"0-0U$N$"$k(B Web $B%Z!<%8$,?.mj$5$l$?%5%$%h$n%;%-%e%j%f%#(b $B%W%m%Q%F%#$r56Au$G$-$k2DG=@-$,$"$k!#(B $B967b ZL@=q$r56Au$7!"(B $B967b$rM=4|$7$F$$$J$$%f!<%6$r?.mq$5$;$k$3$h$,2dg=$g$"$k!#$=$n8e!"967b 5=$K$h$j!"=EMW>pJs$d8D?M>pJs$rMF0W$K@` http://www.securityfocus.com/bid/10797 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BPavuk $B$K$O!"%@%$%8%'%9%HG'>Z$K%j%b!<%h$+$imxmq2dg=$j%p%c%u%!(b $B%*!<%p%u%m!<$nldbj$,b8:_$9$k62$l$,$"$k!#$3$nldbj$o!"%"%w%j%1!<%7%g%s$,%w(b $B%m%;%9%a%b%jFb$NM-8B%P%C%U%!NN0h$K!"%f!<%6$,f~no$7$?%g!<%?$r3jg<$9$k:]!"(b $BJ8;zNsD9$NBEEv@-3NG'$K<:gt$9$k$3$h$k5/0x$9$k!#(b $B:G=*E*$K!"$3$NLdBj$r0-MQ$9$k$3$H$K$h$j!"%j%b!<%h$n0-0u$n$"$k(b Web $B%5%$%H(B $B$,!"1F6A$re$K$*$$$F0U?^$7$?%3!<%i$r http://www.securityfocus.com/bid/10798 $B$^$H$a(B: Nucleus CMS $B$K$O!"967b $N967b$r0z$-5/$3$9$3$H$,2DG=$J!"(BSQL $BJ8$,CmF~$5$l(B $B$kLdBj$,3NG'$5$l$F$$$k!#(B $B$3$NLdBj$O!"(B'action.php' $B%9%/%j%W%H$r2p$7$F%f!<%6$,m?$($kf~nofbmf$nl532(b $B2=$,IT==J,$G$"$k$3$H$K5/0x$9$k!#%j%b!<%h$n%f!<%6$o0u?^$7$?(b SQL $B%/%(%j$r(B $B$3$N%=%U%H%&%'%"$G;HMQ$5$l$F$$$k%G!<%?%y!<%9$ka^f~$g$-$k2dg=@-$,$"$k!#%j(b $B%b!<%h$n967b $N967b$r0z$-5/$3$92DG=@-$,$"$k!#(B 8. XLineSoft ASPRunner Multiple Vulnerabilities BugTraq ID: 10799 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 26 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10799 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BASPRunner $B$OJ#?t$NLdBj$rJz$($F$$$k5?$$$,$"$k!#Js9p$5$l$?Ld(B $BBj$K$O!"(BSQL $BJ8$rA^F~$5$l$kLdBj!"%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj!">pJs(B $BO31L!"%G!<%?%y!<%9%u%!%$%k$xl55v2d$g%"%/%;%92dg=$jldbj$,4^$^$l$f$$$k!#(b $B$3$l$i$NLdBj$O!"(BASPRunner 2.4 $B0JA0$N%P!<%8%g%s$k1f6a$rm?$($k!#(b 9. Subversion 'mod_authz_svn' Access Control Bypass Vulnerabili... BugTraq ID: 10800 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 26 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10800 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BSubversion $B$O(B Apache module $B$N(B 'mod_authz_svn' $B$K%"%/%;%9(B $B%3%s%H%m!<%k$,2shr$5$l$k$rldbj$rjz$($f$$$k!#(b $B$3$l$i$N%"%/%;%9%3%s%H%m!<%k$,2shr$5$l$kldbj$o!"%f!<%6$,fi$_ http://www.securityfocus.com/bid/10801 $B$^$H$a(B: MoinMoin $B$O>\:YITL@$N8"8B>:3J$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$(B $B$k!#$3$NLdBj$O(B PageEditor $B5!G=$K4X78$,$"$k!#6qBNE*$K$O!"$3$NLdBj$O%"%/%;(B $B%9%3%s%H%m!<%k%j%9%h$nite,@z$j :3J$9$k$?$a$K$3$NLdBj$r0-MQ$9$k$H?d;!$5$l$k!#(B $B>\:Y$,ITB-$7$F$$$k$?$a!"$5$i$J$k>pJs$O8=;~E@$G$O8x3+$5$l$F$$$J$$!#$3$N(B BID $B$O$5$i$J$k>pJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10802 $B$^$H$a(B: PostNuke $B$O%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs(B $B9p$5$l$F$$$k!#$3$NLdBj$O(B 'Reviews' $B%9%/%j%W%H$N(B 'title' $B%Q%i%a!<%?$k1f6a(b $B$9$k!#$3$NLdBj$r0-MQ$9$k$3$H$K$h$j!"(BCookie $B$KM3Mh$9$kG'>ZMQ>pJs$r@` http://www.securityfocus.com/bid/10803 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BDropbear SSH $B$O%G%#%8%?%k=pL>I8=`(B(DSS)$B$NG'>Z$K$*$1$k>\:Y(B $BITL@$NLdBj$K$h$j1F6A$rZ$G$"$k!#$3$N1F6AHO0O$,3NG'$5$l$F$$$J$$(B $B$3$H$KN10U$9$Y$-$G$"$k!#$3$N(B BID $B$O99$J$k>pJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10804 $B$^$H$a(B: Invision Power Board $B$K$O!"%j%b!<%h$n%f!<%6$,%/%m%9%5%$%h%9%/%j%w%f%#%s(b $B%0$N967b$r0z$-5/$3$9$3$H$,2DG=$H$J$kLdBj$,B8:_$9$k$HJs9p$5$l$F$$$k!#(B $B$3$NLdBj$K$h$j!"967b e$K$*$$$F l9g!"967b ZMQ>pJs$r@` http://www.securityfocus.com/bid/10805 $B$^$H$a(B: MoinMoin $B$O>\:YITL@$N8"8B>:3J$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$(B $B$k!#$3$NJs9p$K$h$k$H!"$3$NLdBj$O%"%/%;%9%3%s%H%m!<%k%j%9%h$re,mq$7$f$$$j(b $B$$>l9g$KH/@8$9$k!#>\:YITL@$NITHw$,$"$k4X?t$K$h$j!"%j%b!<%h$n967b \:YITB-$N$?$a!"8=;~E@$G$O99$J$k>pJs$O8x3+$5$l$F$$$J$$!#$3$N(B BID $B$O99$J(B $B$k>pJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10806 $B$^$H$a(B: Internet Connect $B$O%m!<%+%k$k$*$1$k0ba4$g$o$j$$0l;~%u%!%$%k$n=hm}$k5/0x(b $B$9$k%7%s%\%j%C%/%j%s%/$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$$k!#$3$N(B $BLdBj$O!"$3$N%=%U%H%&%'%"$,(B 'tmp' $B%G%#%l%/%H%jFb$K?dB,2DG=$J%U%!%$%kL>$G(B $B%U%!%$%k$r:n@.$G$-$k$H$$$&@_7W>e$NITHw$K5/0x$9$k!#(B $B$3$NLdBj$rMxMQ$9$k967b$,@.8y$7$?>l9g!"%m!<%+%k$n967b http://www.securityfocus.com/bid/10807 $B$^$H$a(B: OpenDocMan $B$O!"G'>Z$r2sHr$7$F%"%/%;%92DG=$JLdBj$rJz$($F$$$k$HJs9p$5$l$F(B $B$$$k!#(B $B$3$NLdBj$rMxMQ$9$k967b$K$h$j!"E,@Z$JG'>Z$J$7$G!"%f!<%6!"itlg!"$^$?$o%+%f(b $B%4%j!<$n:n@.!"99?7!">C5n$,2DG=$G$"$k!#(B $B967b C5n$7!"@55,$N%f!<%6$n%"%/%;%9(b $B$rK832$9$k$3$H$b2DG=$G$"$k!#$^$?!"B>$N967b$b2DG=$G$"$k!#(B OpenDocMan 1.2 $B$h$jA0$N%P!<%8%g%s$,!"$3$nldbj$rjz$($f$$$k$hjs9p$5$l$f$$(b $B$k!#(B 17. Zero G InstallAnywhere Insecure Temporary File Creation Vuln... BugTraq ID: 10808 $B%j%b!<%h$+$i$n:f8=@-(b: $B$J$7(B $B8xI=F|(B: Jul 26 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10808 $B$^$H$a(B: InstallAnywhere $B$O!"%m!<%+%k$k$*$1$k%;%-%e%"$g$o$j$$0l;~%u%!%$%k$n A0(B $B$N%U%!%$%k$r%;%-%e%"$G$J$$J}K!$G:n@.2DG=$JITHw$K5/0x$9$k!#(B $B967b$K@.8y$7$?>l9g!":G=*E*$K$O!"%m!<%+%k$n967b $N%P!<%8%g%s$b$3$nldbj$n1f6a$rhttp://www.securityfocus.com/bid/10810 $B$^$H$a(B: Opera Web Browser $B$K$O!"0-0U$"$k%Z!<%8$,%"%i%l%9%p!<$n>pJs$r56Au2DG=$J!"(B $B%;%-%e%j%F%#>e$NLdBj$rJz$($F$$$k5?$$$,$"$k!#$3$NLdBj$O!"6%9g>uBV$N=hM}$N(B $BITHw$K5/0x$9$k!#(B $B967b pJs$rI=<($5$;!"%f!<%6$kbp$7$f!"(bweb $B%Z!<%8$,?.mj$5$l$?%5%$%h(b $B$+$i p(B $BJs$r@` pJs$N@` 5=$,MF0W$H$J$k2DG=@-$,(B $B$"$k!#(B $B$3$NLdBj$*$h$S!"(BBID 10337$B!"(B10452$B!"$*$h$S(B 10679 $B$K5-:\$5$l$F$$$k$b$N$O!"(B $BN`;w$7$?1F6A$,$"$k$,!"$3$l$i$K$O4XO"@-$O$J$$!#(B 19. Unreal IRCD Multiple Vulnerabilities BugTraq ID: 10811 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 27 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10811 $B$^$H$a(B: Unreal ircd $B$K$O!"%j%b!<%h$n967b l(B $B9g!"967b \:Y$OL$>\$G$"$k!#$3$NLdBj$O!"99$J$k(B $B>\:Y$,8x3+$5$l$N%P!<%8%g%s$bf1mm$k1f6a$re$N6<0r$r(b $B$b$?$i$9$b$N$G$O$J$$$3$H$,L@$i$+$K$J$C$F$$$k!#(Bchroot $B$K4X$9$kLdBj$O!"%;(B $B%-%e%j%F%#>e$N6<0r$r$b$?$i$9$hh=cg$5$l!"(bbid 10814 (Unreal IRCD CHRoot Local Privilege Escalation Weakness) $B$,3d$jEv$F$i$l$F$$$k!#$^$?!"K\(B BID $B$OGK4~$5$l$F$$$k!#(B 20. RiSearch/RiSearch Pro Open Proxy Vulnerability BugTraq ID: 10812 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 27 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10812 $B$^$H$a(B: RiSearch $B$*$h$S(B RiSearch Pro $B$K$O!"%*!<%w%s%w%m%-%7$h$7$ff0:n$9$kldbj$r(b $BJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$$k!#Js9p$K$h$k$H!"$3$NLdBj$O!"%f!<%6$n(b $BM?$($k(B URI $B%Q%i%a!<%?$kbp$9$kl5322=$,it==j,$g$"$k$3$h$k5/0x$9$k!#(b $B%j%b!<%h$n967b http://www.securityfocus.com/bid/10813 $B$^$H$a(B: phpMyFAQ $B$O!"G'>Z$r1*2s$5$l$kLdBj$,%$%a!<%8%^%m!<%8%c$kb8:_$9$k$hjs9p$5(b $B$l$F$$$k!#(B $B$3$NLdBj$r0-MQ$9$k$3$H$K$h$j!"%j%b!<%h$nf?l>$N967b Z$J$7$G$3$N%=%U(B $B%H%&%'%"$K2hA|$r%"%C%W%m!<%i$^$?:o=|$9$k$3$h$,2dg=$g$"$k!#(b $B%j%b!<%h$n967b http://www.securityfocus.com/bid/10815 $B$^$H$a(B: FTPGlide $B$O!"%W%m%U%!%$%k$r0BA4$KJ]B8$7$J$$LdBj$rJz$($F$$$k5?$$$,$"$k$H(B $BJs9p$5$l$F$$$k!#$3$N%=%U%H%&%'%"$O!"%f!<%6$,(b FTP $B$^$?$O(B HTTP $B$N%5%$%H$N(B $B%W%m%U%!%$%k$rJ]B8$9$k$3$H$,$G$-$k5!G=$rDs6!$9$k!#$3$N%W%m%U%!%$%k$K$O!"(B $B%5!<%p$n%"%i%l%9!"%f!<%6l>$,4^$^$l$F$*$j!"$b$7%Q%9%o!<%i$rj]b8$9$k%*%w%7%g(b $B%s$,A*Br$5$l$F$$$k>l9g$K$O%Q%9%o!<%i$b4^$^$l$k!#(b $B$3$N%=%U%H%&%'%"$N%$%s%9%H!<%k%g%#%l%/%h%j$k%"%/%;%92dg=$j%f!<%6$g$"$l$p!"(b $BC/$G$b$9$Y$F$NJ]B8$5$l$F$$$k%W%m%U%!%$%k$K%"%/%;%92DG=$G$"$k!#(B 23. Microsoft Internet Explorer Style Tag Comment Memory Corrupt... BugTraq ID: 10816 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 28 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10816 $B$^$H$a(B: Internet Explorer $B$K$O!"967b u(B $BBV$r0z$-5/$3$9$3$H$,$G$-$k2DG=@-$,$"$k!#967b e$KG[CV$9$k!#$=$N8e!"967b$r@.8y$5$;$k$?(B $B$a$K!"967b http://www.securityfocus.com/bid/10817 $B$^$H$a(B: Web Page Generator $B$O!"%5!<%s%9itg=>uBV$K4Y$k>\:YITL@$NLdBj$rJz$($F$$$k(B $B$HJs9p$5$l$F$$$k!#Js9p$K$h$k$H!"$3$NLdBj$O$3$N%=%U%H%&%'%"$N(B Microsoft Windows $BHG$K$N$_1F6A$9$k!#(B $BJs9p$K$h$k$H!"1F6A$rpJs$O8=;~E@$G$O8x3+$5$l$F$$$J$$!#$3$N(B BID$B$O$5$i$J$k>pJs$,8x3+$5(B $B$lhttp://www.securityfocus.com/bid/10818 $B$^$H$a(B: Web Page Generator $B$K$O!"%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$*$h$S>pJs$,(B $BO31L$9$kLdBj$,B8:_$9$k$HJs9p$5$l$F$$$k!#(B $B%(%i!<=hm}5!g=$,%f!<%6$,m?$($?%g!<%?$r==j,$kl5322=$7$j$$$?$a!"%/%m%9%5%$(b $B%H%9%/%j%W%F%#%s%0967b$rZMQ>pJs$r@` $N967b$b2DG=$G$"$k!#(B $B%(%i!<=hm}5!g=$o!"fbit%g%#%l%/%h%j$k4x$9$k>pJs$rO31L$9$kLdBj$bJz$($F$$$k!#(B $B$3$NLdBj$O!"967b l9g$K$N$_B8:_$9$k!#(B 26. SoX WAV File Buffer Overflow Vulnerability BugTraq ID: 10819 $B%j%b!<%h$+$i$n:f8=@-(b: $B$J$7(B $B8xI=F|(B: Jul 28 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10819 $B$^$H$a(B: SoX $B$N(B WAV $B%X%C%@$r=hM}$9$k%3!<%i$k$o!"%p%c%u%!%*!<%p%u%m!<$nldbj$,b8:_(b $B$9$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%f!<%6$,m?$($?%g!<%?$r%w%m%;%9%a%b%jfb(b $B$NM-8B$N%P%C%U%!$K%3%T!<$9$k:]!"j8;znsd9$nbeev@-3ng'$r9t$o$j$$$3$h$k5/0x(b $B$9$k!#(B $B967b e$G0U?^$7$?(B $B%3!<%i$r http://www.securityfocus.com/bid/10820 $B$^$H$a(B: Check Point VPN-1 $B$K$O!"%j%b!<%h$+$imxmq2dg=$j%p%c%u%!%*!<%p%u%m!<$nldbj(b $B$,B8:_$9$k$HJs9p$5$l$F$$$k!#$3$NLdBj$K$h$j!"%j%b!<%h$n967b Aw$KMxMQ$5$l$F$$$k$?$a!"Aw?.85$r56Au$7$?967b$,(B $B2DG=$G$"$k!#(B Check Point $B$NJs9p$K$h$k$H!"C10l$N%Q%1%C%H$K$h$k967b$r@.8y$5$;$k$K$O!"$3(B $B$N%=%U%H%&%'%"$,%"%0%l%C%7%V%b!<%i$g808r49$9$k$h$&@_dj$5$l$f$$$ki,mw$,$"(b $B$k!#%"%0%l%C%7%V%b!<%i$g$o$j$$>l9g!"967b http://www.securityfocus.com/bid/10821 $B$^$H$a(B: AntiBoard $B$K$O!"%f!<%6$,m?$($?%g!<%?$nl5322=$,it==j,$g$"$k$3$h$k5/0x$9$k(b $BJ#?t$NLdBj$,B8:_$9$k$HJs9p$5$l$F$$$k!#$3$l$i$NLdBj$K$O!"(BSQL $BJ8$rA^F~$5$l(B $B$kLdBj$*$h$S%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$,4^$^$l$k!#(B AntiBoard 0.7.2 $B0JA0$N%P!<%8%g%s$,$3$nldbj$k$h$k1f6a$rhttp://www.securityfocus.com/bid/10822 $B$^$H$a(B: Phorum $B$K$O!"%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$,B8:_$9$k$HJs9p$5$l$F$$(B $B$k!#$3$NLdBj$O!"(B'search.php' $B%9%/%j%W%H$K1F6A$r5Z$\$9!#$3$NLdBj$K$h$j%j(B $B%b!<%h$n967b http://www.securityfocus.com/bid/10823 $B$^$H$a(B: DansGuardian $B$O!"(BURI $B$K4^$^$l$k(B 16 $B?J%(%s%3!<%i$5$l$?%u%!%$%k3hd%;r$r=h(b $BM}$9$k:]!"%3%s%F%s%D%U%#%k%?$r1*2s$5$l$kLdBj$rJz$($F$$$k$HJs9p$5$l$F$$$k!#(B $BFCDj$N@_Dj2<$g$o!"$3$nldbj$k$h$j!"%;%-%e%j%f%#%]%j%7!<$n0ch?$r0z$-5/$3$9!"(b $B$^$?$O%f!<%6$,itcm0u$k0-0u$"$k(b Web $B%3%s%F%s%D$K%"%/%;%92DG=$K$J$k$H?d;!(B $B$5$l$k!#(B 31. Comersus Cart SQL Injection Vulnerability BugTraq ID: 10824 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 29 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10824 $B$^$H$a(B: Comersus Cart $B$O!"%j%b!<%h$+$i(b SQL $BJ8$rA^F~$5$l$kLdBj$K$h$k1F6A$rZ$r9T$&:]$K!"0-0U$"$k(B SQL $B9=(B $BJ8$,%f!<%6l>$NMs$NCM$H$7$FEO$5$l$k>l9g$K5/$3$k!#(B $B7k2L$H$7$F!"0-0U$"$k%f!<%6$o%g!<%?%y!<%9%/%(%j$r2~jq$7!"=emw$j>pJs$N1\Mw(B $B$*$h$SJQ99$r9T$&2DG=@-$,$"$j!"@x:_E*$K$3$N%=%U%H%&%'%"!"$^$?$O%G!<%?%y!<(b $B%9$r4m81$K$5$i$9$H?d;!$5$l$k!#(B 32. Verylost LostBook Message Entry HTML Injection Vulnerability BugTraq ID: 10825 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 29 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10825 $B$^$H$a(B: Verylost lostBook $B$O!"%a%C%;!<%8$r5-f~$9$k5!g=fb$k(b HTML $B%?%0$rA^F~$5$l$k(B $BLdBj$K$h$k1F6A$rZMQ>pJs$r@` $N96(B $B7b$b9T$o$l$k2DG=@-$,$"$k!#(B 33. JAWS ControlPanel.PHP SQL Injection Vulnerability BugTraq ID: 10826 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 29 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10826 $B$^$H$a(B: JAWS $B$O!"%j%b!<%h$+$i(b SQL $BJ8$rA^F~$5$l$kLdBj$K$h$k1F6A$rpJs$N(B $B1\Mw$*$h$SJQ99$r9T$&2DG=@-$,$"$j!"@x:_E*$K$3$N%=%U%H%&%'%"!"$^$?$O%G!<%?(b $B%Y!<%9$r4m81$k$5$i$9$h?d;!$5$l$k!#(b 34. LinPHA Session Cookie SQL Injection Vulnerability BugTraq ID: 10827 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 29 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10827 $B$^$H$a(B: LinPHA $B$O!"%;%C%7%g%s(B Cookie $B$r=hM}$9$k%3!<%ifb$k(b SQL $BJ8$rA^F~$5$l$kLdBj(B $B$r4^$s$G$$$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%f!<%6$,m?$($kf~no$,(b SQL $B%/%((B $B%jFb$G;HMQ$5$l$kA0$N!"$3$N%"%W%j%1!<%7%g%s$k$h$kl5322=$,it==j,$g$"$k$3$h(b $B$K5/0x$9$k!#(B $B$3$NLdBj$rMxMQ$9$k967b$K@.8y$7$?>l9g!"7k2L$H$7$F!"$3$N%"%W%j%1!<%7%g%s$r(b $B4m81$K$5$i$9!"%G!<%?$no3$($$$*$h$s2~$6$s$r0z$-5/$3$9!"$^$?$o967b Z$5$l$F$$$k!#(B LinPHA 0.9.4 $B$O!"$3$NLdBj$rJz$($F$$$k2DG=@-$,$"$k$HJs9p$5$l$F$$$k!#$3$l(B $B$h$jA0$N%P!<%8%g%s$b1f6a$rhttp://www.securityfocus.com/bid/10829 $B$^$H$a(B: Oracle database $B$N :3J$,9T$o$l$kLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"(B $B967b http://www.securityfocus.com/bid/10830 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BOpenFTPD $B$O%j%b!<%h%a%c%;!<%8$n=q<0;xdj;r$n l9g!"967b e$K$*$$$F0U?^$7$?%3!<%i(b $B$r http://www.securityfocus.com/bid/10831 $B$^$H$a(B: $BJs9p$K$h$k$H!"(BMyServer $B$O(B 'math_sum.mscgi' $B%5%s%W%k%9%/%j%W%H$KB8:_$9$k(B $B%j%b!<%h$+$imxmq2dg=$jj#?t$nldbj$k$h$k1f6a$re$K$*(B $B$$$F0U?^$7$?%3!<%i$r $N%P!<%8%g%s$b1f6a$rhttp://www.securityfocus.com/bid/10832 $B$^$H$a(B: Mozilla Firefox $B$O!"$=$N%$%s%?%U%'!<%9$r56au$5$l$kldbj$rjz$($f$$$k5?$$$,(b $B$"$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%G%U%)%k%H$G(B JavaScript $B%3!<%i$,$3$n%=(b $B%U%H%&%'%"$N%$%s%?%U%'!<%9$*$h$s%9%f!<%?%9%p!<$r1#$9$3$h$,2dg=$g$"$k$3$h(b $B$K5/0x$9$k!#(BXML User Interface Language API $B$rMxMQ$7$F!"$3$N%=%U%H%&%'%"(B $B$N%$%s%?%U%'!<%9$r56b$$5$l$k2dg=@-$,$"$j!"$3$n%$%s%?%u%'!<%9$o56au:>5=$K(B $BM-MQ$G$"$k$H?d;!$5$l$k!#(B $B$3$N56Au:>5=$r0-MQ$7$F%f!<%6$k0-0u$"$k(b Web $B%5%$%H$r?.MQ$5$;!"%f!<%6$k=e(b $BMW$J>pJs$d8D?M>pJs$NAw?.$rMW5a$9$k2DG=@-$,$"$k!#(B 39. Citadel/UX Username Buffer Overflow Vulnerability BugTraq ID: 10833 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 30 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10833 $B$^$H$a(B: Citadel/UX $B$K$O!"%P%C%U%!%*!<%p%u%m!<$,h/@8$9$kldbj$,b8:_$9$k$hjs9p$5$l(b $B$F$$$k!#$3$NLdBj$O!"(B'USER' $B%3%^%s%I$N0z?t$r=hM}$9$k:]!"6-3&%A%'%C%/$,IT(B $B==J,$G$"$k$3$H$K5/0x$9$k!#(B $B%j%b!<%h$n967b $G Z$G$"$k!#0-MQ$K<:gt$7$?>l9g$O!"%5!<%s%9itg=(b $B>uBV$K4Y$k$H?d;!$5$l$k!#(B 40. SapporoWorks Black JumboDog FTP Server Buffer Overflow Vulne... BugTraq ID: 10834 $B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B $B8xI=F|(B: Jul 30 2004 $B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10834 $B$^$H$a(B: Black JumboDog $B$O!"(BFTP $B%5!<%p$k%p%c%u%!%*!<%p%u%m!<$,h/@8$9$kldbj$,b8:_(b $B$9$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%f!<%6$,m?$($?%g!<%?$r=hm}$9$k:]!"$3$n(b $B%=%U%H%&%'%"$K$h$k6-3&%A%'%C%/$,IT==J,$G$"$k$3$H$K5/0x$9$k!#$3$NLdBj$O!"(B FTP $B%5!<%p$x$ng'>Z$,9T$o$l$kA0$K0-MQ2DG=$G$"$k!#(B $B967b @\%W%m%0%i%`$r l9g!"$3$NLdBj$K$h$j0U?^$7$?%3!<%i$r http://www.securityfocus.com/bid/10835 $B$^$H$a(B: PowerPortal $B$K$O!"(BHTML $B$rA^F~$5$l$k967b$rhttp://www.securityfocus.com/bid/10836 $B$^$H$a(B: Fusion News $B$O!"4IM} l9g!"(B $B967b http://www.securityfocus.com/news/9161 2. Companies adapt to a zero day world $BCx http://www.securityfocus.com/news/9100 3. VoIP hacks gut Caller I.D. $BCx http://www.securityfocus.com/news/9061 4. Anti-spam spamvertisers agree to quit $BCx http://www.securityfocus.com/news/9257 5. Mozilla to pay bounty on bugs $BCx 4$5$l$?!#(B http://www.securityfocus.com/news/9255 6. Singapore holds computer hacking contest to find city-state'... $BCx http://www.securityfocus.com/news/9253 IV. SECURITYFOCUS TOP 6 TOOLS ----------------------------- 1. DiskLogon 1.0.17.112 $B:n http://www.disklogon.com/DiskLogon.exe $BF0:n4D6-(B: Windows 2000$B!"(BWindows XP $B$^$H$a(B: Smart Card $B<0$n%m%0%*%s$k;w$?(b DiskLogon $B$O!"%j%`!<%p%v%k%g%#%9%/$rhw$($?(b $B%3%s%T%e!<%?$k%m%0%*%s$9$k$3$h$,2dg=$g$9!#(bdisklogon $B$O!"%m%0%*%s$9$kEY$K(B $B%f!<%6l>$H%Q%9%o!<%i$rf~no$r$7$j$/$f$o$$$1$j$$:n6h$r>J$-$^$9!#%j%`!<%p%v(b $B%k%G%#%9%/$r:9$79~$`$@$1$G!"%3%s%T%e!<%?$kaa$/!"0ba4$k%m%0%*%s$g$-$^$9!#(b $B%j%`!<%p%v%k%g%#%9%/$rh4$/$3$h$g!"%3%s%t%e!<%?$o<+f0e*$k%m%c%/$5$l$k$?$a(b $B0BA4$G$9!#(B 2. UndeleteSMS 1.0 $B:n http://vidstrom.net/downloads/undeletesms.exe $BF0:n4D6-(B: Windows 2000$B!"(BWindows 95/98$B!"(BWindows NT$B!"(BWindows XP $B$^$H$a(B: UndeleteSMS $B$O(B GSM SIM $B%+!<%i$+$i:o=|$5$l$?(b SMS $B%a%C%;!<%8$ri|85$9$k$3$h(b $B$,2DG=$G$9!#(B 3. Macshift 1.0 $B:n http://students.washington.edu/natetrue/macshift/macshift.zip $BF0:n4D6-(B: Windows 2000$B!"(BWindows XP $B$^$H$a(B: Macshift $B$O!"(BWindows 2k / XP $B$K$*$$$F!"0U?^$9$k%M%C%H%o!<%/%"%@%w%?$n(b MAC $B%"%I%l%9$rJQ99$9$k!"%U%j!<$kmxmq2dg=$j%*!<%w%s%=!<%9$n%d!<%k$g$9!#$3(b $B$N%=%U%H%&%'%"$O!"%7%s%W%k$G!"%9%/%j%W%H$G@)8f2DG=$J%3%^%s%I%i%$%s%$%s%?!<(b $B%U%'%$%9$rHw$($F$$$^$9!#(B 4. Advanced LAN Scanner 1.0 $B:n http://www.radmin.com/download/lscan1b1.exe $BF0:n4D6-(B: Windows 2000$B!"(BWindows 95/98$B!"(BWindows NT$B!"(BWindows XP $B$^$H$a(B: Advanced Lan Scanner $B$O9bB.$G!"%U%!%$%k%5%$%:$,>.$5$/!"$7$+$b;H$$$d$9$$(B $B>\:Y$J@_Dj$,2DG=$J(B Win32 $BMQ$N%M%C%H%o!<%/%9%-%c%j$g$9!#$3$n%=%u%h%&%'%"(b $B$O%^%k%A%9%l%C%I5;=Q$r;HMQ$9$k$3$H$K$h$j!"KhIC(B 1000 $B%N!<%i0j>e$N%9%-%c%s(B $B$,2DG=$G$9!#%]!<%h%9%-%c%smqes$g;hmq$5$l$k>l9g!"$3$N%=%U%H%&%'%"$O!"?tJ,(B $BDxEY$GA4(B 65536 $B%]!<%h$r%a%'%c%/$7$^$9!#$3$n%=%u%h%&%'%"$o!"$*k>$_$N$=$l(B $B$>$l$N%3%s%T%e!<%?$kbp$7$f@53n$j%9%-%c%s$r u67!"$*$h$SB?$/$NM-MQ$J>pJs$rCj=P$7$^$9!#(B 5. Firewall Builder 2.0 $B:n http://www.fwbuilder.org/ $BF0:n4D6-(B: FreeBSD$B!"(BLinux$B!"(BMacOS$B!"(BSolaris$B!"(BWindows 2000$B!"(BWindows XP $B$^$H$a(B: Firewall Builder $B$O!"(BGUI $B$*$h$S!"MM!9$J4D6-8~$1$N0lO"$N%]%j%7!<%3%s%q%$(b $B%i$G9=@.$5$l$F$$$^$9!#$3$N%=%U%H%&%'%"$O!"%*%V%8%'%/%H$N%G!<%?%y!<%9$nj](b $B]%b%G%k$H6&DL$N(B GUI $B$rDs6!$7(B $B$^$9!#$3$N%=%U%H%&%'%"$O!"8=:_!"(Biptables$B!"(Bipfilter$B!"$*$h$S(B OpenBSD pf $B$r(B $B%5%]!<%h$7$f$$$^$9!#(b 6. Lepton's Crack 20031130 $B:n http://www.nestonline.com/lcrack/lcrack-20031130-beta.zip $BF0:n4D6-(B: Linux$B!"(BMacOS$B!"(BOS $B$K0MB8$7$J$$!"(BUNIX$B!"(BWindows 2000$B!"(BWindows NT$B!"(BWindows XP $B$^$H$a(B: Lepton's Crack $B$O0lHLE*$J%Q%9%o!<%i%/%i%c%/%d!<%k$g$9!#$3$n%=%u%h%&%'%"(b $B$O4JC1$J%W%i%0%$%s%7%9%F%`$rHw$(!"MF0W$K%+%9%?%^%$%:2DG=$G$9!#$^$?!"%7%9(B $B%F%`4IM} e$G;HMQ$5$l$F$$$k%Q%9%o!<%i$nm%ni@-$r8!::$9$k$?(b $B$a$KMxMQ2DG=$G$9!#$3$N%=%U%H%&%'%"$O!"<-=q(b (wordlist) $B$rMxMQ$7$?967b$*$h(B $B$S%V%k!<%h%u%)!<%9(b (incremental) $B$K$h$k%Q%9%o!<%i%9%-%c%s$r B<9/mn(b(nishimura Yasuhiro)$B!">.NS9nL&(B(KOBAYASHI Katsumi)$B!"(B $BA}ED@;;R(B(MASUDA Kiyoko)$B!"A}EDCR0l(B(MASUDA Tomokazu)$B!"(B $BGOCeFF(B(UMAKI Atsushi)$B!"3QED8<;j(b(kakuda Motoshi)$B!"(B $B9b66=SB@O:(B(TAKAHASHI Shuntarou)$B!"?e>B9n?M(B(MIZUNUMA Katsuhito)$B!"(B $BEDCfM%5#(B(TANAKA Yuuki)$B!"AjGO4pK.(B(SOUMA Motokuni) $B4F=$(B: $B@>B<9/mn(b(nishimura Yasuhiro) LAC Co., Ltd. http://www.lac.co.jp/security/
Attachment:
smime.p7s
Description: S/MIME cryptographic signature