[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

SecurityFocus Newsletter #260 2004$BG/(B7$B7n(B26$BF|(B->2004$BG/(B7$B7n(B30$BF|(B



$B@>B<(b@$b%i%c%/$g$9!#(b
SecurityFocus Newsletter $BBh(B 260 $B9f$NOBLu$r$*FO$1$7$^$9!#(B
$BLu$N$J$$9`L\$K$D$$$F$O!VF|K\8lLu$J$7!W$H$7$F6hJL$7$F$"$j$^$9!#(B
---------------------------------------------------------------------------
BugTraq-JP $B$K4X$9$k(B FAQ($BF|K\8l(B):
http://www.securityfocus.com/popups/forums/bugtraq-jp/faq.shtml
$B!&(BSecurityFocus Newsletter $B$NOBLu$O(B BugTraq-JP $B$G0lH$/$@$5$$(B
---------------------------------------------------------------------------
---------------------------------------------------------------------------
SecurityFocus Newsletter $B$K4X$9$k(BFAQ($B1Q8l(B):
http://www.securityfocus.com/popups/forums/securityfocusnews/intro.shtml
BugTraq $B$K4X$9$k(B FAQ($B1Q8l(B):
http://www.securityfocus.com/popups/forums/bugtraq/faq.shtml
---------------------------------------------------------------------------
$B0zMQ$K4X$9$kHw9M(B:
$B!&$3$NOBLu$O(B SecurityFocus $B$N5v2D$r3t<02qe$G9T$o$l$F$$$^$9!#(B
$B!&(BSecurityFocus Newsletter $B$NOBLu$r(B Netnews, Mailinglist, World Wide Web,
 $B=q@R(B, $B$=$NB>$N5-O?G^BN$G0zMQ$5$l$k>l9g$K$O%a!<%k$na4j80zmq$r$*4j$$$7$^$9!#(b
$B!&F|K\8lHG%K%e!<%9%l%?!<(b 1 $B9f$+$i(B 3 $B9f$^$G$K$O$3$NHw9M$,IU$$$F$$$^$;$s$,!"(B
 $B=`MQ$9$k$b$N$H$7$^$9!#(B
$B!&$^$?!"(BSecurityFocus $BDs6!$N(B BugTraq-JP $B%"!<%+%$%v(b [*1] $B$X$N$$$+$J$k7A<0$n(b
 $B%O%$%Q!<%j%s%/$b>e5-$K=`$8$F$/$@$5$$!#(B
1) http://online.securityfocus.com/archive/79
---------------------------------------------------------------------------
$B$3$NOBLu$K4X$9$kHw9M(B:
$B!&$3$NOBLu$NE,MQ@.2L$K$D$$$F3t<02ql9g!"(BBugTraq-JP $B$X(B Errata $B$H$7$F=$@5(B
 $BHG$r$4Ej9FD:$/$+!"4F=$l9g$K$O=$@5HG$r$G$-$k$@$1?WB.$KH/9T$7$^$9!#(B
---------------------------------------------------------------------------
This translation is encoded and posted in ISO-2022-JP.
$B86HG(B:
Date: 3 Aug 2004 21:28:13 -0000
Message-ID: <20040803212813.29015.qmail@xxxxxxxxxxxxxxxxxxxxxx>
SecurityFocus Newsletter #260
-----------------------------
This Issue is Sponsored By: SecurityFocus
I. FRONT AND CENTER($BF|K\8lLu$J$7(B)
 1. Data Driven Attacks Using HTTP Tunneling
 2. Email Privacy is Lost
II. BUGTRAQ SUMMARY
 1. EasyWeb FileManager Module Directory Traversal Vulnerability
 2. PostNuke Install Script Administrator Password Disclosure Vu...
 3. eSeSIX Thintune Thin Client Devices Multiple Vulnerabilities
 4. EasyIns Stadtportal Site Parameter Remote File Include Vulne...
 5. Mozilla Firefox Refresh Security Property Spoofing Vulnerabi...
 6. Pavuk Remote Digest Authentication Buffer Overflow Vulnerabi...
 7. Nucleus CMS Action.PHP SQL Injection Vulnerability
 8. XLineSoft ASPRunner Multiple Vulnerabilities
 9. Subversion 'mod_authz_svn' Access Control Bypass Vulnerabili...
 10. MoinMoin PageEditor Unspecified Privilege Escalation Vulnera...
 11. PostNuke Reviews Module Cross-Site Scripting Vulnerability
 12. Dropbear SSH Server Digital Signature Standard Unspecified A...
 13. Invision Power Board Index.php Query String Cross-Site Scrip...
 14. MoinMoin Unspecified Privilege Escalation Vulnerability
 15. Apple Mac OSX Internet Connect Insecure Temporary File Handl...
 16. OpenDocMan Access Control Bypass Vulnerability
 17. Zero G InstallAnywhere Insecure Temporary File Creation Vuln...
 18. Opera Web Browser Location Replace URI Obfuscation Weakness
 19. Unreal IRCD Multiple Vulnerabilities
 20. RiSearch/RiSearch Pro Open Proxy Vulnerability
 21. phpMyFAQ Image Manager Authentication Bypass Vulnerability
 22. FTPGlide Insecure Local Profile Storage Vulnerability
 23. Microsoft Internet Explorer Style Tag Comment Memory Corrupt...
 24. Hitachi Web Page Generator Unspecified Denial Of Service Vul...
 25. Hitachi Web Page Generator Cross-Site Scripting and Informat...
 26. SoX WAV File Buffer Overflow Vulnerability
 27. Check Point VPN-1 ASN.1 Buffer Overflow Vulnerability
 28. AntiBoard Multiple Input Validation Vulnerabilities
 29. Phorum Search Script Cross-Site Scripting Vulnerability
 30. DansGuardian Hex Encoded File Extension URI Content Filter B...
 31. Comersus Cart SQL Injection Vulnerability
 32. Verylost LostBook Message Entry HTML Injection Vulnerability
 33. JAWS ControlPanel.PHP SQL Injection Vulnerability
 34. LinPHA Session Cookie SQL Injection Vulnerability
 35. Oracle Database Default Library Directory Privilege Escalati...
 36. OpenFTPD Remote Message Format String Vulnerability
 37. MyServer Multiple Remote math_sum.mscgi Example Script Vulne...
 38. Mozilla Firefox XML User Interface Language Browser Interfac...
 39. Citadel/UX Username Buffer Overflow Vulnerability
 40. SapporoWorks Black JumboDog FTP Server Buffer Overflow Vulne...
 41. PowerPortal Private Message HTML Injection Vulnerability
 42. FusionPHP Fusion News Administrator Command Execution Vulner...
III. SECURITYFOCUS NEWS ARTICLES
 1. ATM keypads get a security boost
 2. Companies adapt to a zero day world
 3. VoIP hacks gut Caller I.D.
 4. Anti-spam spamvertisers agree to quit
 5. Mozilla to pay bounty on bugs
 6. Singapore holds computer hacking contest to find city-state'...
IV. SECURITYFOCUS TOP 6 TOOLS
 1. DiskLogon 1.0.17.112
 2. UndeleteSMS 1.0
 3. Macshift 1.0
 4. Advanced LAN Scanner 1.0
 5. Firewall Builder 2.0
 6. Lepton's Crack 20031130
I. FRONT AND CENTER($BF|K\8lLu$J$7(B)
---------------------------------
II. BUGTRAQ SUMMARY
-------------------
1. EasyWeb FileManager Module Directory Traversal Vulnerability
BugTraq ID: 10792
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 23 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10792
$B$^$H$a(B:
EasyWeb $B$O!"%G%#%l%/%H%j$N;2>H$K4X$9$kLdBj$rJz$($F$$$k5?$$$,$"$k!#$3$NLd(B
$BBj$O!"%f!<%6$,m?$($k%g!<%?$kbp$9$kl5322=$,it==j,$g$"$k$3$h$k5/0x$9$k!#$3(b
$B$NLdBj$O!"%j%b!<%h$n967bH$K4X$9(B
$B$kJ8;zNs$r4^$`%U%!%$%k$X$N%j%/%(%9%H$r!"(B'ew_filemanager' $B%9%/%j%W%H$KAw(B
$B?.$9$k$3$H$GH/@8$9$k!#(B
EasyWeb FileManager 1.0 RC-1 $B$O!"$3$NLdBj$rJz$($F$$$k5?$$$,$"$k!#(B
$B99?7(B:EasyWeb $B4IM}ZL@=q$r;}$C$?967bpJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10793
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BPostNuke $B$O%j%b!<%h$n967bZMQ>pJs$r3+<($9$k(b
$B2DG=@-$,$"$k!#$3$NLdBj$O!"$3$N%=%U%H%&%'%"$N%$%s%9%H!<%k8e$k!"%$%s%9%h!<(b
$B%k%9%/%j%W%H$G$"$k(B 'install.php' $B$r:o=|$7$J$$$3$H$K5/0x$9$k!#$3$NLdBj$K(B
$B$h$j!"967b$N%f!<%6(b
$B$d1F6A$rhttp://www.securityfocus.com/bid/10794
$B$^$H$a(B:
Thintune $B$N(B Linux $B$GMxMQ$9$k%G%P%$%9$K$O!"J#?t$NLdBj$,B8:_$9$k5?$$$,$"$k(B
$B$HJs9p$5$l$F$$$k!#$3$l$i$NLdBj$K$h$j!"%j%b!<%h$n967bpJsO31L$NLdBj$r4^$s$G$$(B
$B$k!#(B
$B%U%!!<%`%&%'%"(b 2.4.38 $B0JA0$N(B Thintune $B%G%P%$%9$,!"$3$l$i$NLdBj$K$h$k1F6A(B
$B$re$G2TF0$9$k(B Thintune $B%G%P%$%9$O!"$3(B
$B$NLdBj$K1F6A$5$l$J$$!#(B
4. EasyIns Stadtportal Site Parameter Remote File Include Vulne...
BugTraq ID: 10795
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 24 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10795
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BEasyIns Stadtportal $B$K$O!"967be$G$N%P!<%8%g%s$bf1mm$k1f6a$rhttp://www.securityfocus.com/bid/10796
$B$^$H$a(B:
Mozilla Firefox $B$O!"0-0U$N$"$k(B Web $B%Z!<%8$,?.mj$5$l$?%5%$%h$n%;%-%e%j%f%#(b
$B%W%m%Q%F%#$r56Au$G$-$k2DG=@-$,$"$k!#(B
$B967bZL@=q$r56Au$7!"(B
$B967b$rM=4|$7$F$$$J$$%f!<%6$r?.mq$5$;$k$3$h$,2dg=$g$"$k!#$=$n8e!"967b5=$K$h$j!"=EMW>pJs$d8D?M>pJs$rMF0W$K@`http://www.securityfocus.com/bid/10797
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BPavuk $B$K$O!"%@%$%8%'%9%HG'>Z$K%j%b!<%h$+$imxmq2dg=$j%p%c%u%!(b
$B%*!<%p%u%m!<$nldbj$,b8:_$9$k62$l$,$"$k!#$3$nldbj$o!"%"%w%j%1!<%7%g%s$,%w(b
$B%m%;%9%a%b%jFb$NM-8B%P%C%U%!NN0h$K!"%f!<%6$,f~no$7$?%g!<%?$r3jg<$9$k:]!"(b
$BJ8;zNsD9$NBEEv@-3NG'$K<:gt$9$k$3$h$k5/0x$9$k!#(b
$B:G=*E*$K!"$3$NLdBj$r0-MQ$9$k$3$H$K$h$j!"%j%b!<%h$n0-0u$n$"$k(b Web $B%5%$%H(B
$B$,!"1F6A$re$K$*$$$F0U?^$7$?%3!<%i$rhttp://www.securityfocus.com/bid/10798
$B$^$H$a(B:
Nucleus CMS $B$K$O!"967b$N967b$r0z$-5/$3$9$3$H$,2DG=$J!"(BSQL $BJ8$,CmF~$5$l(B
$B$kLdBj$,3NG'$5$l$F$$$k!#(B
$B$3$NLdBj$O!"(B'action.php' $B%9%/%j%W%H$r2p$7$F%f!<%6$,m?$($kf~nofbmf$nl532(b
$B2=$,IT==J,$G$"$k$3$H$K5/0x$9$k!#%j%b!<%h$n%f!<%6$o0u?^$7$?(b SQL $B%/%(%j$r(B
$B$3$N%=%U%H%&%'%"$G;HMQ$5$l$F$$$k%G!<%?%y!<%9$ka^f~$g$-$k2dg=@-$,$"$k!#%j(b
$B%b!<%h$n967b$N967b$r0z$-5/$3$92DG=@-$,$"$k!#(B
8. XLineSoft ASPRunner Multiple Vulnerabilities
BugTraq ID: 10799
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 26 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10799
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BASPRunner $B$OJ#?t$NLdBj$rJz$($F$$$k5?$$$,$"$k!#Js9p$5$l$?Ld(B
$BBj$K$O!"(BSQL $BJ8$rA^F~$5$l$kLdBj!"%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj!">pJs(B
$BO31L!"%G!<%?%y!<%9%u%!%$%k$xl55v2d$g%"%/%;%92dg=$jldbj$,4^$^$l$f$$$k!#(b
$B$3$l$i$NLdBj$O!"(BASPRunner 2.4 $B0JA0$N%P!<%8%g%s$k1f6a$rm?$($k!#(b
9. Subversion 'mod_authz_svn' Access Control Bypass Vulnerabili...
BugTraq ID: 10800
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 26 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10800
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BSubversion $B$O(B Apache module $B$N(B 'mod_authz_svn' $B$K%"%/%;%9(B
$B%3%s%H%m!<%k$,2shr$5$l$k$rldbj$rjz$($f$$$k!#(b
$B$3$l$i$N%"%/%;%9%3%s%H%m!<%k$,2shr$5$l$kldbj$o!"%f!<%6$,fi$_http://www.securityfocus.com/bid/10801
$B$^$H$a(B:
MoinMoin $B$O>\:YITL@$N8"8B>:3J$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$(B
$B$k!#$3$NLdBj$O(B PageEditor $B5!G=$K4X78$,$"$k!#6qBNE*$K$O!"$3$NLdBj$O%"%/%;(B
$B%9%3%s%H%m!<%k%j%9%h$nite,@z$j:3J$9$k$?$a$K$3$NLdBj$r0-MQ$9$k$H?d;!$5$l$k!#(B
$B>\:Y$,ITB-$7$F$$$k$?$a!"$5$i$J$k>pJs$O8=;~E@$G$O8x3+$5$l$F$$$J$$!#$3$N(B 
BID $B$O$5$i$J$k>pJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10802
$B$^$H$a(B:
PostNuke $B$O%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs(B
$B9p$5$l$F$$$k!#$3$NLdBj$O(B 'Reviews' $B%9%/%j%W%H$N(B 'title' $B%Q%i%a!<%?$k1f6a(b
$B$9$k!#$3$NLdBj$r0-MQ$9$k$3$H$K$h$j!"(BCookie $B$KM3Mh$9$kG'>ZMQ>pJs$r@`http://www.securityfocus.com/bid/10803
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BDropbear SSH $B$O%G%#%8%?%k=pL>I8=`(B(DSS)$B$NG'>Z$K$*$1$k>\:Y(B
$BITL@$NLdBj$K$h$j1F6A$rZ$G$"$k!#$3$N1F6AHO0O$,3NG'$5$l$F$$$J$$(B
$B$3$H$KN10U$9$Y$-$G$"$k!#$3$N(B BID $B$O99$J$k>pJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10804
$B$^$H$a(B:
Invision Power Board $B$K$O!"%j%b!<%h$n%f!<%6$,%/%m%9%5%$%h%9%/%j%w%f%#%s(b
$B%0$N967b$r0z$-5/$3$9$3$H$,2DG=$H$J$kLdBj$,B8:_$9$k$HJs9p$5$l$F$$$k!#(B
$B$3$NLdBj$K$h$j!"967be$K$*$$$Fl9g!"967bZMQ>pJs$r@`http://www.securityfocus.com/bid/10805
$B$^$H$a(B:
MoinMoin $B$O>\:YITL@$N8"8B>:3J$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$(B
$B$k!#$3$NJs9p$K$h$k$H!"$3$NLdBj$O%"%/%;%9%3%s%H%m!<%k%j%9%h$re,mq$7$f$$$j(b
$B$$>l9g$KH/@8$9$k!#>\:YITL@$NITHw$,$"$k4X?t$K$h$j!"%j%b!<%h$n967b\:YITB-$N$?$a!"8=;~E@$G$O99$J$k>pJs$O8x3+$5$l$F$$$J$$!#$3$N(B BID $B$O99$J(B
$B$k>pJs$,8x3+$5$lhttp://www.securityfocus.com/bid/10806
$B$^$H$a(B:
Internet Connect $B$O%m!<%+%k$k$*$1$k0ba4$g$o$j$$0l;~%u%!%$%k$n=hm}$k5/0x(b
$B$9$k%7%s%\%j%C%/%j%s%/$NLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$$k!#$3$N(B
$BLdBj$O!"$3$N%=%U%H%&%'%"$,(B 'tmp' $B%G%#%l%/%H%jFb$K?dB,2DG=$J%U%!%$%kL>$G(B
$B%U%!%$%k$r:n@.$G$-$k$H$$$&@_7W>e$NITHw$K5/0x$9$k!#(B
$B$3$NLdBj$rMxMQ$9$k967b$,@.8y$7$?>l9g!"%m!<%+%k$n967bhttp://www.securityfocus.com/bid/10807
$B$^$H$a(B:
OpenDocMan $B$O!"G'>Z$r2sHr$7$F%"%/%;%92DG=$JLdBj$rJz$($F$$$k$HJs9p$5$l$F(B
$B$$$k!#(B
$B$3$NLdBj$rMxMQ$9$k967b$K$h$j!"E,@Z$JG'>Z$J$7$G!"%f!<%6!"itlg!"$^$?$o%+%f(b
$B%4%j!<$n:n@.!"99?7!">C5n$,2DG=$G$"$k!#(B
$B967bC5n$7!"@55,$N%f!<%6$n%"%/%;%9(b
$B$rK832$9$k$3$H$b2DG=$G$"$k!#$^$?!"B>$N967b$b2DG=$G$"$k!#(B
OpenDocMan 1.2 $B$h$jA0$N%P!<%8%g%s$,!"$3$nldbj$rjz$($f$$$k$hjs9p$5$l$f$$(b
$B$k!#(B
17. Zero G InstallAnywhere Insecure Temporary File Creation Vuln...
BugTraq ID: 10808
$B%j%b!<%h$+$i$n:f8=@-(b: $B$J$7(B
$B8xI=F|(B: Jul 26 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10808
$B$^$H$a(B:
InstallAnywhere $B$O!"%m!<%+%k$k$*$1$k%;%-%e%"$g$o$j$$0l;~%u%!%$%k$nA0(B
$B$N%U%!%$%k$r%;%-%e%"$G$J$$J}K!$G:n@.2DG=$JITHw$K5/0x$9$k!#(B
$B967b$K@.8y$7$?>l9g!":G=*E*$K$O!"%m!<%+%k$n967b$N%P!<%8%g%s$b$3$nldbj$n1f6a$rhttp://www.securityfocus.com/bid/10810
$B$^$H$a(B:
Opera Web Browser $B$K$O!"0-0U$"$k%Z!<%8$,%"%i%l%9%p!<$n>pJs$r56Au2DG=$J!"(B
$B%;%-%e%j%F%#>e$NLdBj$rJz$($F$$$k5?$$$,$"$k!#$3$NLdBj$O!"6%9g>uBV$N=hM}$N(B
$BITHw$K5/0x$9$k!#(B
$B967bpJs$rI=<($5$;!"%f!<%6$kbp$7$f!"(bweb $B%Z!<%8$,?.mj$5$l$?%5%$%h(b
$B$+$ip(B
$BJs$r@`pJs$N@`5=$,MF0W$H$J$k2DG=@-$,(B
$B$"$k!#(B
$B$3$NLdBj$*$h$S!"(BBID 10337$B!"(B10452$B!"$*$h$S(B 10679 $B$K5-:\$5$l$F$$$k$b$N$O!"(B
$BN`;w$7$?1F6A$,$"$k$,!"$3$l$i$K$O4XO"@-$O$J$$!#(B
19. Unreal IRCD Multiple Vulnerabilities
BugTraq ID: 10811
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 27 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10811
$B$^$H$a(B:
Unreal ircd $B$K$O!"%j%b!<%h$n967bl(B
$B9g!"967b\:Y$OL$>\$G$"$k!#$3$NLdBj$O!"99$J$k(B
$B>\:Y$,8x3+$5$l$N%P!<%8%g%s$bf1mm$k1f6a$re$N6<0r$r(b
$B$b$?$i$9$b$N$G$O$J$$$3$H$,L@$i$+$K$J$C$F$$$k!#(Bchroot $B$K4X$9$kLdBj$O!"%;(B
$B%-%e%j%F%#>e$N6<0r$r$b$?$i$9$hh=cg$5$l!"(bbid 10814 (Unreal IRCD CHRoot
Local Privilege Escalation Weakness) $B$,3d$jEv$F$i$l$F$$$k!#$^$?!"K\(B BID 
$B$OGK4~$5$l$F$$$k!#(B
20. RiSearch/RiSearch Pro Open Proxy Vulnerability
BugTraq ID: 10812
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 27 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10812
$B$^$H$a(B:
RiSearch $B$*$h$S(B RiSearch Pro $B$K$O!"%*!<%w%s%w%m%-%7$h$7$ff0:n$9$kldbj$r(b
$BJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$$k!#Js9p$K$h$k$H!"$3$NLdBj$O!"%f!<%6$n(b
$BM?$($k(B URI $B%Q%i%a!<%?$kbp$9$kl5322=$,it==j,$g$"$k$3$h$k5/0x$9$k!#(b
$B%j%b!<%h$n967bhttp://www.securityfocus.com/bid/10813
$B$^$H$a(B:
phpMyFAQ $B$O!"G'>Z$r1*2s$5$l$kLdBj$,%$%a!<%8%^%m!<%8%c$kb8:_$9$k$hjs9p$5(b
$B$l$F$$$k!#(B
$B$3$NLdBj$r0-MQ$9$k$3$H$K$h$j!"%j%b!<%h$nf?l>$N967bZ$J$7$G$3$N%=%U(B
$B%H%&%'%"$K2hA|$r%"%C%W%m!<%i$^$?:o=|$9$k$3$h$,2dg=$g$"$k!#(b
$B%j%b!<%h$n967bhttp://www.securityfocus.com/bid/10815
$B$^$H$a(B:
FTPGlide $B$O!"%W%m%U%!%$%k$r0BA4$KJ]B8$7$J$$LdBj$rJz$($F$$$k5?$$$,$"$k$H(B
$BJs9p$5$l$F$$$k!#$3$N%=%U%H%&%'%"$O!"%f!<%6$,(b FTP $B$^$?$O(B HTTP $B$N%5%$%H$N(B
$B%W%m%U%!%$%k$rJ]B8$9$k$3$H$,$G$-$k5!G=$rDs6!$9$k!#$3$N%W%m%U%!%$%k$K$O!"(B
$B%5!<%p$n%"%i%l%9!"%f!<%6l>$,4^$^$l$F$*$j!"$b$7%Q%9%o!<%i$rj]b8$9$k%*%w%7%g(b
$B%s$,A*Br$5$l$F$$$k>l9g$K$O%Q%9%o!<%i$b4^$^$l$k!#(b
$B$3$N%=%U%H%&%'%"$N%$%s%9%H!<%k%g%#%l%/%h%j$k%"%/%;%92dg=$j%f!<%6$g$"$l$p!"(b
$BC/$G$b$9$Y$F$NJ]B8$5$l$F$$$k%W%m%U%!%$%k$K%"%/%;%92DG=$G$"$k!#(B
23. Microsoft Internet Explorer Style Tag Comment Memory Corrupt...
BugTraq ID: 10816
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 28 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10816
$B$^$H$a(B:
Internet Explorer $B$K$O!"967bu(B
$BBV$r0z$-5/$3$9$3$H$,$G$-$k2DG=@-$,$"$k!#967be$KG[CV$9$k!#$=$N8e!"967b$r@.8y$5$;$k$?(B
$B$a$K!"967bhttp://www.securityfocus.com/bid/10817
$B$^$H$a(B:
Web Page Generator $B$O!"%5!<%s%9itg=>uBV$K4Y$k>\:YITL@$NLdBj$rJz$($F$$$k(B
$B$HJs9p$5$l$F$$$k!#Js9p$K$h$k$H!"$3$NLdBj$O$3$N%=%U%H%&%'%"$N(B Microsoft
Windows $BHG$K$N$_1F6A$9$k!#(B
$BJs9p$K$h$k$H!"1F6A$rpJs$O8=;~E@$G$O8x3+$5$l$F$$$J$$!#$3$N(B BID$B$O$5$i$J$k>pJs$,8x3+$5(B
$B$lhttp://www.securityfocus.com/bid/10818
$B$^$H$a(B:
Web Page Generator $B$K$O!"%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$*$h$S>pJs$,(B
$BO31L$9$kLdBj$,B8:_$9$k$HJs9p$5$l$F$$$k!#(B
$B%(%i!<=hm}5!g=$,%f!<%6$,m?$($?%g!<%?$r==j,$kl5322=$7$j$$$?$a!"%/%m%9%5%$(b
$B%H%9%/%j%W%F%#%s%0967b$rZMQ>pJs$r@`$N967b$b2DG=$G$"$k!#(B
$B%(%i!<=hm}5!g=$o!"fbit%g%#%l%/%h%j$k4x$9$k>pJs$rO31L$9$kLdBj$bJz$($F$$$k!#(B
$B$3$NLdBj$O!"967bl9g$K$N$_B8:_$9$k!#(B
26. SoX WAV File Buffer Overflow Vulnerability
BugTraq ID: 10819
$B%j%b!<%h$+$i$n:f8=@-(b: $B$J$7(B
$B8xI=F|(B: Jul 28 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10819
$B$^$H$a(B:
SoX $B$N(B WAV $B%X%C%@$r=hM}$9$k%3!<%i$k$o!"%p%c%u%!%*!<%p%u%m!<$nldbj$,b8:_(b
$B$9$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%f!<%6$,m?$($?%g!<%?$r%w%m%;%9%a%b%jfb(b
$B$NM-8B$N%P%C%U%!$K%3%T!<$9$k:]!"j8;znsd9$nbeev@-3ng'$r9t$o$j$$$3$h$k5/0x(b
$B$9$k!#(B
$B967be$G0U?^$7$?(B
$B%3!<%i$rhttp://www.securityfocus.com/bid/10820
$B$^$H$a(B:
Check Point VPN-1 $B$K$O!"%j%b!<%h$+$imxmq2dg=$j%p%c%u%!%*!<%p%u%m!<$nldbj(b
$B$,B8:_$9$k$HJs9p$5$l$F$$$k!#$3$NLdBj$K$h$j!"%j%b!<%h$n967bAw$KMxMQ$5$l$F$$$k$?$a!"Aw?.85$r56Au$7$?967b$,(B
$B2DG=$G$"$k!#(B
Check Point $B$NJs9p$K$h$k$H!"C10l$N%Q%1%C%H$K$h$k967b$r@.8y$5$;$k$K$O!"$3(B
$B$N%=%U%H%&%'%"$,%"%0%l%C%7%V%b!<%i$g808r49$9$k$h$&@_dj$5$l$f$$$ki,mw$,$"(b
$B$k!#%"%0%l%C%7%V%b!<%i$g$o$j$$>l9g!"967bhttp://www.securityfocus.com/bid/10821
$B$^$H$a(B:
AntiBoard $B$K$O!"%f!<%6$,m?$($?%g!<%?$nl5322=$,it==j,$g$"$k$3$h$k5/0x$9$k(b
$BJ#?t$NLdBj$,B8:_$9$k$HJs9p$5$l$F$$$k!#$3$l$i$NLdBj$K$O!"(BSQL $BJ8$rA^F~$5$l(B
$B$kLdBj$*$h$S%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$,4^$^$l$k!#(B
AntiBoard 0.7.2 $B0JA0$N%P!<%8%g%s$,$3$nldbj$k$h$k1f6a$rhttp://www.securityfocus.com/bid/10822
$B$^$H$a(B:
Phorum $B$K$O!"%/%m%9%5%$%H%9%/%j%W%F%#%s%0$NLdBj$,B8:_$9$k$HJs9p$5$l$F$$(B
$B$k!#$3$NLdBj$O!"(B'search.php' $B%9%/%j%W%H$K1F6A$r5Z$\$9!#$3$NLdBj$K$h$j%j(B
$B%b!<%h$n967bhttp://www.securityfocus.com/bid/10823
$B$^$H$a(B:
DansGuardian $B$O!"(BURI $B$K4^$^$l$k(B 16 $B?J%(%s%3!<%i$5$l$?%u%!%$%k3hd%;r$r=h(b
$BM}$9$k:]!"%3%s%F%s%D%U%#%k%?$r1*2s$5$l$kLdBj$rJz$($F$$$k$HJs9p$5$l$F$$$k!#(B
$BFCDj$N@_Dj2<$g$o!"$3$nldbj$k$h$j!"%;%-%e%j%f%#%]%j%7!<$n0ch?$r0z$-5/$3$9!"(b
$B$^$?$O%f!<%6$,itcm0u$k0-0u$"$k(b Web $B%3%s%F%s%D$K%"%/%;%92DG=$K$J$k$H?d;!(B
$B$5$l$k!#(B
31. Comersus Cart SQL Injection Vulnerability
BugTraq ID: 10824
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 29 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10824
$B$^$H$a(B:
Comersus Cart $B$O!"%j%b!<%h$+$i(b SQL $BJ8$rA^F~$5$l$kLdBj$K$h$k1F6A$rZ$r9T$&:]$K!"0-0U$"$k(B SQL $B9=(B
$BJ8$,%f!<%6l>$NMs$NCM$H$7$FEO$5$l$k>l9g$K5/$3$k!#(B
$B7k2L$H$7$F!"0-0U$"$k%f!<%6$o%g!<%?%y!<%9%/%(%j$r2~jq$7!"=emw$j>pJs$N1\Mw(B
$B$*$h$SJQ99$r9T$&2DG=@-$,$"$j!"@x:_E*$K$3$N%=%U%H%&%'%"!"$^$?$O%G!<%?%y!<(b
$B%9$r4m81$K$5$i$9$H?d;!$5$l$k!#(B
32. Verylost LostBook Message Entry HTML Injection Vulnerability
BugTraq ID: 10825
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 29 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10825
$B$^$H$a(B:
Verylost lostBook $B$O!"%a%C%;!<%8$r5-f~$9$k5!g=fb$k(b HTML $B%?%0$rA^F~$5$l$k(B
$BLdBj$K$h$k1F6A$rZMQ>pJs$r@`$N96(B
$B7b$b9T$o$l$k2DG=@-$,$"$k!#(B
33. JAWS ControlPanel.PHP SQL Injection Vulnerability
BugTraq ID: 10826
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 29 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10826
$B$^$H$a(B:
JAWS $B$O!"%j%b!<%h$+$i(b SQL $BJ8$rA^F~$5$l$kLdBj$K$h$k1F6A$rpJs$N(B
$B1\Mw$*$h$SJQ99$r9T$&2DG=@-$,$"$j!"@x:_E*$K$3$N%=%U%H%&%'%"!"$^$?$O%G!<%?(b
$B%Y!<%9$r4m81$k$5$i$9$h?d;!$5$l$k!#(b
34. LinPHA Session Cookie SQL Injection Vulnerability
BugTraq ID: 10827
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 29 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10827
$B$^$H$a(B:
LinPHA $B$O!"%;%C%7%g%s(B Cookie $B$r=hM}$9$k%3!<%ifb$k(b SQL $BJ8$rA^F~$5$l$kLdBj(B
$B$r4^$s$G$$$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%f!<%6$,m?$($kf~no$,(b SQL $B%/%((B
$B%jFb$G;HMQ$5$l$kA0$N!"$3$N%"%W%j%1!<%7%g%s$k$h$kl5322=$,it==j,$g$"$k$3$h(b
$B$K5/0x$9$k!#(B
$B$3$NLdBj$rMxMQ$9$k967b$K@.8y$7$?>l9g!"7k2L$H$7$F!"$3$N%"%W%j%1!<%7%g%s$r(b
$B4m81$K$5$i$9!"%G!<%?$no3$($$$*$h$s2~$6$s$r0z$-5/$3$9!"$^$?$o967bZ$5$l$F$$$k!#(B
LinPHA 0.9.4 $B$O!"$3$NLdBj$rJz$($F$$$k2DG=@-$,$"$k$HJs9p$5$l$F$$$k!#$3$l(B
$B$h$jA0$N%P!<%8%g%s$b1f6a$rhttp://www.securityfocus.com/bid/10829
$B$^$H$a(B:
Oracle database $B$N:3J$,9T$o$l$kLdBj$rJz$($F$$$k5?$$$,$"$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"(B
$B967bhttp://www.securityfocus.com/bid/10830
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BOpenFTPD $B$O%j%b!<%h%a%c%;!<%8$n=q<0;xdj;r$nl9g!"967be$K$*$$$F0U?^$7$?%3!<%i(b
$B$rhttp://www.securityfocus.com/bid/10831
$B$^$H$a(B:
$BJs9p$K$h$k$H!"(BMyServer $B$O(B 'math_sum.mscgi' $B%5%s%W%k%9%/%j%W%H$KB8:_$9$k(B
$B%j%b!<%h$+$imxmq2dg=$jj#?t$nldbj$k$h$k1f6a$re$K$*(B
$B$$$F0U?^$7$?%3!<%i$r$N%P!<%8%g%s$b1f6a$rhttp://www.securityfocus.com/bid/10832
$B$^$H$a(B:
Mozilla Firefox $B$O!"$=$N%$%s%?%U%'!<%9$r56au$5$l$kldbj$rjz$($f$$$k5?$$$,(b
$B$"$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%G%U%)%k%H$G(B JavaScript $B%3!<%i$,$3$n%=(b
$B%U%H%&%'%"$N%$%s%?%U%'!<%9$*$h$s%9%f!<%?%9%p!<$r1#$9$3$h$,2dg=$g$"$k$3$h(b
$B$K5/0x$9$k!#(BXML User Interface Language API $B$rMxMQ$7$F!"$3$N%=%U%H%&%'%"(B
$B$N%$%s%?%U%'!<%9$r56b$$5$l$k2dg=@-$,$"$j!"$3$n%$%s%?%u%'!<%9$o56au:>5=$K(B
$BM-MQ$G$"$k$H?d;!$5$l$k!#(B
$B$3$N56Au:>5=$r0-MQ$7$F%f!<%6$k0-0u$"$k(b Web $B%5%$%H$r?.MQ$5$;!"%f!<%6$k=e(b
$BMW$J>pJs$d8D?M>pJs$NAw?.$rMW5a$9$k2DG=@-$,$"$k!#(B
39. Citadel/UX Username Buffer Overflow Vulnerability
BugTraq ID: 10833
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 30 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10833
$B$^$H$a(B:
Citadel/UX $B$K$O!"%P%C%U%!%*!<%p%u%m!<$,h/@8$9$kldbj$,b8:_$9$k$hjs9p$5$l(b
$B$F$$$k!#$3$NLdBj$O!"(B'USER' $B%3%^%s%I$N0z?t$r=hM}$9$k:]!"6-3&%A%'%C%/$,IT(B
$B==J,$G$"$k$3$H$K5/0x$9$k!#(B
$B%j%b!<%h$n967b$GZ$G$"$k!#0-MQ$K<:gt$7$?>l9g$O!"%5!<%s%9itg=(b
$B>uBV$K4Y$k$H?d;!$5$l$k!#(B
40. SapporoWorks Black JumboDog FTP Server Buffer Overflow Vulne...
BugTraq ID: 10834
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Jul 30 2004
$B4XO"$9$k(B URL: http://www.securityfocus.com/bid/10834
$B$^$H$a(B:
Black JumboDog $B$O!"(BFTP $B%5!<%p$k%p%c%u%!%*!<%p%u%m!<$,h/@8$9$kldbj$,b8:_(b
$B$9$k$HJs9p$5$l$F$$$k!#$3$NLdBj$O!"%f!<%6$,m?$($?%g!<%?$r=hm}$9$k:]!"$3$n(b
$B%=%U%H%&%'%"$K$h$k6-3&%A%'%C%/$,IT==J,$G$"$k$3$H$K5/0x$9$k!#$3$NLdBj$O!"(B
FTP $B%5!<%p$x$ng'>Z$,9T$o$l$kA0$K0-MQ2DG=$G$"$k!#(B
$B967b@\%W%m%0%i%`$rl9g!"$3$NLdBj$K$h$j0U?^$7$?%3!<%i$rhttp://www.securityfocus.com/bid/10835
$B$^$H$a(B:
PowerPortal $B$K$O!"(BHTML $B$rA^F~$5$l$k967b$rhttp://www.securityfocus.com/bid/10836
$B$^$H$a(B:
Fusion News $B$O!"4IM}l9g!"(B
$B967bhttp://www.securityfocus.com/news/9161
2. Companies adapt to a zero day world
$BCxhttp://www.securityfocus.com/news/9100
3. VoIP hacks gut Caller I.D.
$BCxhttp://www.securityfocus.com/news/9061
4. Anti-spam spamvertisers agree to quit
$BCxhttp://www.securityfocus.com/news/9257
5. Mozilla to pay bounty on bugs
$BCx4$5$l$?!#(B
http://www.securityfocus.com/news/9255
6. Singapore holds computer hacking contest to find city-state'...
$BCxhttp://www.securityfocus.com/news/9253
IV. SECURITYFOCUS TOP 6 TOOLS
-----------------------------
1. DiskLogon 1.0.17.112
$B:nhttp://www.disklogon.com/DiskLogon.exe
$BF0:n4D6-(B: Windows 2000$B!"(BWindows XP
$B$^$H$a(B: 
Smart Card $B<0$n%m%0%*%s$k;w$?(b DiskLogon $B$O!"%j%`!<%p%v%k%g%#%9%/$rhw$($?(b
$B%3%s%T%e!<%?$k%m%0%*%s$9$k$3$h$,2dg=$g$9!#(bdisklogon $B$O!"%m%0%*%s$9$kEY$K(B
$B%f!<%6l>$H%Q%9%o!<%i$rf~no$r$7$j$/$f$o$$$1$j$$:n6h$r>J$-$^$9!#%j%`!<%p%v(b
$B%k%G%#%9%/$r:9$79~$`$@$1$G!"%3%s%T%e!<%?$kaa$/!"0ba4$k%m%0%*%s$g$-$^$9!#(b
$B%j%`!<%p%v%k%g%#%9%/$rh4$/$3$h$g!"%3%s%t%e!<%?$o<+f0e*$k%m%c%/$5$l$k$?$a(b
$B0BA4$G$9!#(B
2. UndeleteSMS 1.0
$B:nhttp://vidstrom.net/downloads/undeletesms.exe
$BF0:n4D6-(B: Windows 2000$B!"(BWindows 95/98$B!"(BWindows NT$B!"(BWindows XP
$B$^$H$a(B: 
UndeleteSMS $B$O(B GSM SIM $B%+!<%i$+$i:o=|$5$l$?(b SMS $B%a%C%;!<%8$ri|85$9$k$3$h(b
$B$,2DG=$G$9!#(B
3. Macshift 1.0
$B:nhttp://students.washington.edu/natetrue/macshift/macshift.zip
$BF0:n4D6-(B: Windows 2000$B!"(BWindows XP
$B$^$H$a(B: 
Macshift $B$O!"(BWindows 2k / XP $B$K$*$$$F!"0U?^$9$k%M%C%H%o!<%/%"%@%w%?$n(b 
MAC $B%"%I%l%9$rJQ99$9$k!"%U%j!<$kmxmq2dg=$j%*!<%w%s%=!<%9$n%d!<%k$g$9!#$3(b
$B$N%=%U%H%&%'%"$O!"%7%s%W%k$G!"%9%/%j%W%H$G@)8f2DG=$J%3%^%s%I%i%$%s%$%s%?!<(b
$B%U%'%$%9$rHw$($F$$$^$9!#(B
4. Advanced LAN Scanner 1.0
$B:nhttp://www.radmin.com/download/lscan1b1.exe
$BF0:n4D6-(B: Windows 2000$B!"(BWindows 95/98$B!"(BWindows NT$B!"(BWindows XP
$B$^$H$a(B: 
Advanced Lan Scanner $B$O9bB.$G!"%U%!%$%k%5%$%:$,>.$5$/!"$7$+$b;H$$$d$9$$(B
$B>\:Y$J@_Dj$,2DG=$J(B Win32 $BMQ$N%M%C%H%o!<%/%9%-%c%j$g$9!#$3$n%=%u%h%&%'%"(b
$B$O%^%k%A%9%l%C%I5;=Q$r;HMQ$9$k$3$H$K$h$j!"KhIC(B 1000 $B%N!<%i0j>e$N%9%-%c%s(B
$B$,2DG=$G$9!#%]!<%h%9%-%c%smqes$g;hmq$5$l$k>l9g!"$3$N%=%U%H%&%'%"$O!"?tJ,(B
$BDxEY$GA4(B 65536 $B%]!<%h$r%a%'%c%/$7$^$9!#$3$n%=%u%h%&%'%"$o!"$*k>$_$N$=$l(B
$B$>$l$N%3%s%T%e!<%?$kbp$7$f@53n$j%9%-%c%s$ru67!"$*$h$SB?$/$NM-MQ$J>pJs$rCj=P$7$^$9!#(B
5. Firewall Builder 2.0
$B:nhttp://www.fwbuilder.org/
$BF0:n4D6-(B: FreeBSD$B!"(BLinux$B!"(BMacOS$B!"(BSolaris$B!"(BWindows 2000$B!"(BWindows XP
$B$^$H$a(B: 
Firewall Builder $B$O!"(BGUI $B$*$h$S!"MM!9$J4D6-8~$1$N0lO"$N%]%j%7!<%3%s%q%$(b
$B%i$G9=@.$5$l$F$$$^$9!#$3$N%=%U%H%&%'%"$O!"%*%V%8%'%/%H$N%G!<%?%y!<%9$nj](b
$B]%b%G%k$H6&DL$N(B GUI $B$rDs6!$7(B
$B$^$9!#$3$N%=%U%H%&%'%"$O!"8=:_!"(Biptables$B!"(Bipfilter$B!"$*$h$S(B OpenBSD pf $B$r(B
$B%5%]!<%h$7$f$$$^$9!#(b
6. Lepton's Crack 20031130
$B:nhttp://www.nestonline.com/lcrack/lcrack-20031130-beta.zip
$BF0:n4D6-(B: Linux$B!"(BMacOS$B!"(BOS $B$K0MB8$7$J$$!"(BUNIX$B!"(BWindows 2000$B!"(BWindows NT$B!"(BWindows XP
$B$^$H$a(B: 
Lepton's Crack $B$O0lHLE*$J%Q%9%o!<%i%/%i%c%/%d!<%k$g$9!#$3$n%=%u%h%&%'%"(b
$B$O4JC1$J%W%i%0%$%s%7%9%F%`$rHw$(!"MF0W$K%+%9%?%^%$%:2DG=$G$9!#$^$?!"%7%9(B
$B%F%`4IM}e$G;HMQ$5$l$F$$$k%Q%9%o!<%i$nm%ni@-$r8!::$9$k$?(b
$B$a$KMxMQ2DG=$G$9!#$3$N%=%U%H%&%'%"$O!"<-=q(b (wordlist) $B$rMxMQ$7$?967b$*$h(B
$B$S%V%k!<%h%u%)!<%9(b (incremental) $B$K$h$k%Q%9%o!<%i%9%-%c%s$rB<9/mn(b(nishimura Yasuhiro)$B!">.NS9nL&(B(KOBAYASHI Katsumi)$B!"(B
$BA}ED@;;R(B(MASUDA Kiyoko)$B!"A}EDCR0l(B(MASUDA Tomokazu)$B!"(B
$BGOCeFF(B(UMAKI Atsushi)$B!"3QED8<;j(b(kakuda Motoshi)$B!"(B
$B9b66=SB@O:(B(TAKAHASHI Shuntarou)$B!"?e>B9n?M(B(MIZUNUMA Katsuhito)$B!"(B
$BEDCfM%5#(B(TANAKA Yuuki)$B!"AjGO4pK.(B(SOUMA Motokuni)
$B4F=$(B: $B@>B<9/mn(b(nishimura Yasuhiro)
LAC Co., Ltd.
http://www.lac.co.jp/security/ 

Attachment: smime.p7s
Description: S/MIME cryptographic signature


AltStyle $B$K$h$C$FJQ49$5$l$?%Z!<%8(b (->$B%*%j%8%J%k(B) /