SecurityFocus.com Newsletter #121 2001$BG/(B11$B7n(B26$BF|(B->2001$BG/(B11$B7n(B30$BF|(B



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
$B1F;3(B@$B%i%C%/$G$9!#(B
SecurityFocus.com Newsletter $BBh(B 121 $B9f$NOBLu$r$*FO$1$7$^$9!#(B
$BLu$N$J$$9`L\$K$D$$$F$O!VF|K\8lLu$J$7!W$H$7$F6hJL$7$F$"$j$^$9!#(B
- ---------------------------------------------------------------------------
SecurityFocus.com Newsletter $B$K4X$9$k(BFAQ:
http://www.securityfocus.com/popups/forums/securityfocusnews/intro.shtml
BugTraq-JP $B$K4X$9$k(B FAQ:
http://www.securityfocus.com/popups/forums/bugtraq-jp/faq.shtml
- ---------------------------------------------------------------------------
$B0zMQ$K4X$9$kHw9M(B:
$B!&$3$NOBLu$O(B Security-Focus.com $B$N5v2D$r3t<02qe$G9T$o(B
 $B$l$F$$$^$9!#(B
$B!&(BSecurityFocus.com Newsletter $B$NOBLu$r(B Netnews, Mailinglist,
 World Wide Web, $B=q@R(B, $B$=$NB>$N5-O?G^BN$G0zMQ$5$l$k>l9g$K$O%a!<%k$n(b
 $BA4J80zMQ$r$*4j$$$7$^$9!#(B
$B!&F|K\8lHG%K%e!<%9%l%?!<(b 1 $B9f$+$i(B 3 $B9f$^$G$K$O$3$NHw9M$,IU$$$F$$$^$;(B
 $B$s$,=`MQ$9$k$b$N$H$7$^$9!#(B
$B!&$^$?!"(BSecurity-Focus.com $BDs6!$N(B BugTraq-JP $B%"!<%+%$%v(b [*1] $B$X$N$$$+(B
 $B$J$k7A<0$n%o%$%q!<%j%s%/$b>e5-$K=`$8$F$/$@$5$$!#(B
1) http://www.securityfocus.com/archive/79
- ---------------------------------------------------------------------------
- ---------------------------------------------------------------------------
$B$3$NOBLu$K4X$9$kHw9M(B:
$B!&$3$NOBLu$NE,MQ@.2L$K$D$$$F3t<02ql9g!"(BBUGTRAQ-JP $B$X(B Errata $B$H$7$F=$@5(B
 $BHG$r$4Ej9FD:$/$+!"Lul9g$K$O=$@5HG$r$G$-$k$@$1?WB.$KH/9T$7$^$9!#(B
- ---------------------------------------------------------------------------
- ---------------------------------------------------------------------------
$B86HG(B:
Message-ID: <20011203191421.7335.qmail@securityfocus.com>
Date: Mon, 3 Dec 2001 12:14 -0700
SecurityFocus Newsletter #121
- ---------------------------------
This Issue Sponsored by: John Wiley & Sons
I. FRONT AND CENTER($BF|K\8lLu$J$7(B)
 1. Advertising Information
 2. A Brief History of The Worm 
 3. Appropriate Response: More Questions Than Answers
 4. Overview of LIDS, Part Four 
 5. Black Hats Prefer Linux
II. BUGTRAQ SUMMARY
 1. Xircom Rex 6000 Password Retrieval Vulnerability
 2. Stronghold Secure Web Server Information Disclosure Vulnerability
 3. AutoNice Daemon Program Name Format String Vulnerability
 4. iMatix Xitami Administrator Plain Text Password Storage...
 5. Sun NetDynamics Session ID Hijacking Vulnerability
 6. Gnome libgtop_daemon Remote Format String Vulnerability
 7. Wu-Ftpd File Globbing Heap Corruption Vulnerability
III. SECURITYFOCUS.COM NEWS ARTICLES
 1. R.I.P. Cypherpunks
 2. Oops! Linux Bug Escapes Early
 3. AV Vendors Split Over FBI Trojan 
 4. Thirty Nations Sign Cybercrime Treaty 
IV.SECURITY FOCUS TOP 6 TOOLS
 1. Gnome Xsu v0.2.2 
 2. Portable OpenSSH v3.0.1p1
 3. Papillon v0.4.0a 
 4. SMB Auditing Tool v1.0.4 
 5. SMBProxy v1.0.0 
 6. Qtfw v0.4b 
I. FRONT AND CENTER($BF|K\8lLu$J$7(B)
- ---------------------------------
II. BUGTRAQ SUMMARY
- -------------------
1. Xircom Rex 6000 Password Retrieval Vulnerability
BugTraq ID: 3574
$B%j%b!<%h$+$i$n:f8=@-(b: $B$J$7(B
$B8xI=F|(B: Nov 23 2001 12:00A
$B4XO"$9$k(BURL:
http://www.securityfocus.com/bid/3574
$B$^$H$a(B:
Xircom Rex 6000 PDA $B$N%f!<%6$o!"(brextools $B$H8F$P$l$k%=%U%H%&%'%"$r(B Micro-
PDA $B5!4o$K5-O?$5$l$F$$$kFbMF$r4IM}$9$k$?$a$K!"%G%9%/%H%C%W$K%$%s%9%H!<%k(b
$B2DG=$G$"$k!#$3$N%=%U%H%&%'%"$NMxMQ$O%9%?%s%I%"%m%s%7%9%F%`$KIUB0$9$k%7%j(B
$B%"%k%]!<%h(b (COMx) $B$K(B PDA $B$r@\B3$7!"$5$i$K(B 10 $B8D$N?t;z$+$i$J$k0E>ZHV9f$r(B
$B$3$N%=%U%H%&%'%"Fb$K(B PDA $B$NFbMF$rI=<($5$;$k$?$a$kf~no$9$k9t0y$k$h$c$f9t(b
$B$o$l$k!#(B
$B$7$+$7!"(BRextools $B%"%W%j%1!<%7%g%s$x(b PDA $B$+$i0E>ZHV9f>pJs$rE>Aw$9$kJ}K!(B
$B$,LdBj$J$N$G$"$k!#(BRex 6000 $B$OG'>ZMQ>pJs$rJ?J8$GE>Aw$r9T$C$F$$$k!#(B
$BG'>Z;~$K$O!"0E>ZHV9f$O@\B3@h$X$N@\B3$r2p$7$FAw?.$5$l$k!#$7$+$7!"$=$N:]!"(B
$BK\Mh$N@\B3$H$OL54X78$N%7%j%"%k%]!<%h%b%k%?$,fbit$h30it$n%h%i%u%#%c%/$r(b
$B%b%K%?$7!"0E>ZHV9f$r<}=82dg=$j$n$g$"$k!#0e>ZHV9f$OJ?J8$G$"$j!"@5Ev$J8"(B
$B8B$r;}$?$J$$%f!<%6$k$h$k%m%0%$%s$r@.8y$5$;$k$?$a$kmxmq2dg=$g$"$k!#(b
2. Stronghold Secure Web Server Information Disclosure Vulnerability
BugTraq ID: 3577
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Nov 23 2001 12:00A
$B4XO"$9$k(BURL:
http://www.securityfocus.com/bid/3577
$B$^$H$a(B:
RedHat Stronghold Secure Web Server $B$O(B Apache $B$N%=!<%9$r85$k$7$?(b Web
$B%5!<%p$g$"$j!"6/8g$+$d%;%-%e%"$h$j$kmm$k@_7w$5$l$f$$$k!#(b
$B$3$N(B Web $B%5!<%p$n%g%u%)%k%h%$%s%9%h!<%k>uBV$G$O!"(BWeb $B%5!<%p$nf0:n>uBV$r(B
$BJs9p$9$k$?$a$KMxMQ$5$l$k!"(BApache $BM3Mh$N%b%8%e!<%k(b mod_status $B$,4^$^$l$F(B
$B$$$k!#$7$+$7!"$3$N%b%8%e!<%k$rmxmq$7$f3+<($5$l$k>pJs$K$O=EBg$JFbMF$,4^(B
$B$^$l!"$^$?!"(Bhttpd.conf $B%U%!%$%k$NFbMF$b4^$^$l$F$$$k$N$G$"$k!#$3$N$?$a!"(B
$B0-0U$"$k%f!<%6$o0j8e$n967b$n=`hw$r9t$&$?$a$k$3$n%b%8%e!<%k$+$if@$i$l$k(b
$B>pJs$rMxMQ$9$k;v$,?d;!$5$l$k$N$G$"$k!#(B
$B$3$N%b%8%e!<%k$r2p$7$f>pJs$rF~http://target/stronghold-info 
http://target/stronghold-status
$B$3$N%b%8%e!<%k$o(b Apache $BK\BN$K%G%U%)%k%H>uBV$G4^$^$l$kMM$K%3%s%Q%$%k$5(B
$B$l$F$$$k$,!"%G%U%)%k%H>uBV$G$OM-8z$K$O$J$C$F$$$J$$!#$3$NLdBj$O%b%8%e!<(b
$B%k$,(B ExtendedStatus $B%G%#%l%/%F%#%V$rMxMQ$7$FM-8z2=$5$l$F$*$j!"(Bhttpd.conf
$B%U%!%$%k$K$h$C$F30It$+$i$N%"%/%;%9$,$J$*$b6X;_$5$l$F$$$J$$>l9g$K1F6A$r(B
$B5Z$\$9!#(B
$B8=9THG$N(B Stronghold Administration Guide $BFb$G$O!"30It$+$i$N%"%/%;%9$r@)(B
$B8B$9$kJ}K!$K4X$9$k>\:Y$JH2DG=$G$"$k!#(B
3. AutoNice Daemon Program Name Format String Vulnerability
BugTraq ID: 3580
$B%j%b!<%h$+$i$n:f8=@-(b: $B$J$7(B
$B8xI=F|(B: Nov 26 2001 12:00A
$B4XO"$9$k(BURL:
http://www.securityfocus.com/bid/3580
$B$^$H$a(B:
AutoNice Daemon (AND) $B$O%7%9%F%`Fb$N%W%m%;%9$N3hF0>uBV$K@)8B$r2C$($i$l(B
$B$kMM$K@_7W$5$l$?!"%U%j!<$g!"%*!<%w%s%=!<%9$g$"$k%=%u%h%&%'%"%q%c%1!<%8(b
$B$G$"$k!#(B
$B$3$N%=%U%H%&%'%"$O;XDj$5$l$?%a%b%jMFNL$d(B CPU $B;q8;$r1[$($FMxMQ$7$?%W%m(B
$B%;%9$r6/@)=*N;=hM}$r9T$&Ey$N5!G=$rDs6!$7$F$$$k!#(B
$B$7$+$7!"$3$N%G!<%b%s$k$o%m!<%+%k$n%f!<%6$k$h$k8"8b>:3J$r2DG=$K$9$kLdBj(B
$B$,B8:_$9$k$N$G$"$k!#LdBj$O$$$/$D$+$N%W%m%;%9L>$Nl9g!"%G!<%b%s$oev3:(b
$B$N%W%m%;%9$X(B SIGKILL $B%7%0%J%k!"$"$k$$$O%W%m%;%9$N=hM}$rDd;_$9$k$?$a$NN`(B
$B;w$N%7%0%J%k$rAw?.$9$k=`Hw$r9T$&!#(B
$B$7$+$7!"Nc$($P(B "%n%n%n%n" $B$d(B "%c%c%c%c" $B$NMM$K=q<0;xdj;r$,%w%m%;%9$nl>(B
$BA0$K4^$^$l$F$$$k>l9g!"(BAND $B$O=q<0;xdj;r$nu67$r>7$/(B
$B;v$,2DG=$J$N$G$"$k!#(B
$B$3$NLdBj$K$h$j!"%m!<%+%k%f!<%6$o0-0u$r;}$c$fah$_n)$f$i$l$?%w%m%0%i%`$n(b
$B4. iMatix Xitami Administrator Plain Text Password Storage Vulnerability
BugTraq ID: 3582
$B%j%b!<%h$+$i$n:f8=@-(b: $B$J$7(B
$B8xI=F|(B: Nov 26 2001 12:00A
$B4XO"$9$k(BURL:
http://www.securityfocus.com/bid/3582
$B$^$H$a(B:
Xitami $B$O(B iMatix $B$K$h$C$FJ]Z$KMQ$$$i$l$k>pJs$,3+<($5$l$f$7$^(b
$B$&7k2L$,A[Dj$5$l$kLdBj$,Js9p$5$l$F$$$k!#(B
$B%m!<%+%k%f!<%6$,(b 'default.aut' $B$rF~l9g!"$3$N%=%U%H%&%'%"MQ$N(B
$B4IM}Z$KMQ$$$i$l$k>pJs$rl(B
$B9g!"J?6QE*$J%f!<%6$o$3$n%u%!%$%k$r;2>H$9$k;v$O$G$-F@$J$$$H9M$($i$l$kE@(B
$B$OCm5-$5$l$k$Y$-$G$"$k!#$7$+$7!"$3$l$O%$%s%9%H!<%k@h$n@_dj>uBV$K0MB8$9(B
$B$k!#(B
$B$3$NLdBj$rMxMQ$9$k967b$,@.8y$7$?>l9g!"0J8e$N%[%9%H$N%;%-%e%j%F%#$X$N6<(b
$B0R$rB%$9;v$,2DG=$G$"$k!#(B
5. Sun NetDynamics Session ID Hijacking Vulnerability
BugTraq ID: 3583
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Nov 26 2001 12:00A
$B4XO"$9$k(BURL:
http://www.securityfocus.com/bid/3583
$B$^$H$a(B:
NetDynamics $B$O4k6H8~$1$N(B Web $B%]!<%?%k%"%w%j%1!<%7%g%s$k!"jq3ge*$j%=(b
$B%j%e!<%7%g%s$rds6!$9$k$?$a$k@_7w$5$l$?%"%w%j%1!<%7%g%s%5!<%p72$g$"$k!#(b
$B%f!<%6$,$3$n%=%u%h%&%'%"$kg'>Z$r;n$_$k:]!"$3$N%"%W%j%1!<%7%g%s$o(b 2 $B$D(B
$B$NCM$rIU$1$i$l$F$$$k!#(B
$B$=$l0J8e$KB3$1$FG'>Z$r9T$&%f!<%6$,g'>Z$K@.8y$9$k:]!"4{$K@8@.$5$l$?%;%C(B
$B%7%g%sCM$,$J$*$bM-8z$J>uBV$N$^$^$G$"$k!"(B15 $BIC4VM-8z$J%&%$%s%I%&$,B8:_$7(B
$BF@$k$N$G$"$k!#(B
$B$3$N%&%$%s%I%&$G$O!"0-0U$"$k%f!<%6$o4{$kg'>Z$r9T$C$?%f!<%6$k@.$j$9$^$7(b
$B$?>e$G!"G$0U$N%3%^%s%I$rhttp://victim/cgi-bin/ndcgi.exe/[command>mapping]/[command]?SPIDERSESSION=[...]&uniqueValue=XXXXXXXXXXXXX
NetDynamics $B$N%3%^%s%I7OE}$K4X$9$kCN<1$r;}$d967bZ:Q$N%f!<%6%"(b
$B%+%&%s%H$r>h$Cl9g!"@5Ev$J%f!<%6$o$3$nldbj$,@8$8$k;v$k4x$7$f7y9p$r6. Gnome libgtop_daemon Remote Format String Vulnerability
BugTraq ID: 3586
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Nov 27 2001 12:00A
$B4XO"$9$k(BURL:
http://www.securityfocus.com/bid/3586
$B$^$H$a(B:
GNOME libgtop_daemon $B$O%j%b!<%h$n%7%9%f%`>e$N%W%m%;%9$N>uBV$r4F;k$9$k$?(B
$B$a$KMxMQ$5$l$k%G!<%b%s$g$"$k!#(b
$B$$$/$D$+$N>u67$K$*$$$F!"%j%b!<%h$n%3%m%/%7%g%s$,<:gt$9$k:]$k!"%f!<%6$o(b
$B%m%0$K:NpJs$,%m%0%U%!%$%k$K=q$-=P$5$l$kMM$J!"=q<0;xdjit$r4^(b
$B$`J8;zNs$rAH$_N)$F$k;v$,2DG=$J$N$G$"$k!#$^$?!"$=$l$rMxMQ$9$k;v$G@x:_E*(B
$B$KG$0U$N%3!<%i$r%j%b!<%h$+$io(B nobody $B$H$7$F]$H$7$F$N(B
$B8"8B>:3J$O$h$jMF0W$G$"$k;v$,?d;!$5$l$k!#(B
$B$h$j0JA0$N%P!<%8%g%s$n$3$n%=%u%h%&%'%"$k$*$$$f$b!"f1mm$nldbj$rjz$($k$^(b
$B$^$G$"$k2DG=@-$,$"$k!#(B
7. Wu-Ftpd File Globbing Heap Corruption Vulnerability
BugTraq ID: 3581
$B%j%b!<%h$+$i$n:f8=@-(b: $B$"$j(B
$B8xI=F|(B: Nov 27 2001 12:00A
$B4XO"$9$k(BURL:
http://www.securityfocus.com/bid/3581
$B$^$H$a(B:
wu-ftpd $B$O(B BSD UNIX $B$KF1:-$5$l$F$$$?(B ftpd $B$KM3Mh$9$k(B ftp $B%5!<%p$g$"$j!"(b
$B%o%7%s%H%sBg3X$K$h$C$FJ]e$GG$0U$N%3!<%i$r%j%b!<%h$+$ie$KB8:_$7!"(Bmalloc() $B$rMxMQ$7$F3d$jEv$F$,9T$o$l$F$$$k!#%0%m%S%s%0$r9T$&(B
$B4X?t$OC1$K%j%9%H$X$N%]%$%s%?$rJV$9$@$1$G$"$j!"3d$jEv$F$i$l$?%a%b%j$r3+(B
$BJ|$9$k$?$a$K4X?t$,8F$P$l$k$^$G$=$l$O7QB3$5$l$k!#(B
$B%Q%?!<%s$n=hm}$k%(%i!<$,@8$8$k:]!"%a%b%j$o3d$jev$f$i$l$:!"$^$?!"$=$l$r(b
$B<($9cm$,@_dj$5$l$k$y$-$g$"$j!"8f$s=p$7$r9t$&4x?t$o%0%m%s%s%0=hm}:q$n%u%!(b
$B%$%kL>$NMxMQ$r;n$_$kA0$K(B($B$=$7$F0J8e%a%b%j$r3+J|$9$kA0$K(B)$B!"$3$NCM$rH=CG(B
$B$7$F$$$J$1$l$P$J$i$J$$!#(B
$B$7$+$7FCDj$N>u67$K$*$$$F!"%0%m%S%s%0$r9T$&4X?t$O%(%i!<$,@8$8$k:]$k$3$n(b
$BCM$r@_Dj$7$J$$$N$G$"$k!#$3$N7k2L!"(Bwu-ftpd $B$O=i4|2=$5$l$F$$$J$$%a%b%j$N(B
$B3+J|$r@5$K;n$_$F$7$^$&$N$G$"$k!#(B
$B$b$7$b!"(Bfree() $B$,8F$P$l$kA0$K!"$3$N=i4|2=$5$l$F$$$J$$%a%b%jNN0h$K%f!<(b
$B%6$,@_Dj2DG=$J%G!<%?$,4^$^$l$f$$$k>l9g!"G$0U$NCM$GG$0U$N%a%b%jFb$N%o!<(b
$B%I$r>e=q$-$9$kMM$K;E8~$1$k;v$,2DG=$J$N$G$"$k!#(B
$B$3$N7k2L!"4X?t%]%$%s%?$d%j%?!<%s%"%i%l%9$,>e=q$-$5$l$k:]!"G$0U$N%3!<%i(b
$B$N(B FTP $B5!G=$,M-8z$K$J$C$F$$$J$$>l9g!"$3$NLdBj$rMxMQ$9$k967b$r9T$&$?$a(B
$B$K$O@5Ev$J%f!<%6$ng'>ZMQ>pJs$,I,MW$G$"$k!#(B
$B$3$NLdBj$OEv=i(B 2001 $BG/(B 12 $B7n(B 3 $BF|$K0lHL$X$N8x3+$,M=Dj$5$l$F$$$?!#(B
$B$7$+$7!"(BRedHat $B$O(B 2001 $BG/(B 11 $B7n(B 27 $BF|$K>\:Y$J>pJs$r8x3+$7$?$?$a!"(BSecurity-
Focus $B$O1F6A$r$N@=IJ$N%f!<%6$kbp$7!"%f!<%6$,e,@z$j=hcv$r9t$&$y(b
$B$/5^9p$rH/$9$k$b$N$G$"$k!#(B
III. SECURITYFOCUS.COM NEWS AND COMMENTARY 
- ------------------------------------------
1. R.I.P. Cypherpunks
$BCx$J0E9f@lLg2H$N%*%s%i%$%s$N@8B)CO$rK,$M$?$J$i$P!"G.?4$J0E9f(B
$B$NF3$-http://www.securityfocus.com/news/294
2. Oops! Linux Bug Escapes Early
$BCx$N%Y%s%@$r:.Mp$K4Y$i$9!":$OG$NBP>]$G$"$k(B Linux $B$KH/8+$5$l$?(B
$B%;%-%e%j%F%#%[!<%k$k4x$9$k>pJs$N%W%l%j%j!<%9$r!"ebfm$k9t$c$?!#(b
http://www.securityfocus.com/news/293
3. AV Vendors Split Over FBI Trojan
$BCxhttp://www.securityfocus.com/news/292
4. Thirty Nations Sign Cybercrime Treaty
$BCxrLs$KD40u$7$?!#(B
http://www.securityfocus.com/news/291
IV.SECURITY FOCUS TOP 6 TOOLS
- -----------------------------
1. Gnome Xsu v0.2.2 
$B:nhttp://xsu.freax.eu.org/ 
$B%W%i%C%H%U%)!<%`(b: FreeBSD$B!"(BLinux
$B$^$H$a(B: 
Gnome Xsu $B$O!"(B"su - username -c $B%3%^%s%I(B" $BMQ$N(B GUI $B$G$9!#(B
$B$3$N%=%U%H%&%'%"$O(B setuid root $B$,@_Dj$5$l$F$*$i$:!"$^$?!"%3%^%s%I$r2. Portable OpenSSH v3.0.1p1 
$B:nhttp://www.openssh.com/portable.html 
$B%W%i%C%H%U%)!<%`(b: Linux$B!"(BUNIX
$B$^$H$a(B: 
$B$3$l$O!"(BOpenBSD $B%W%m%8%'%/%H$NAG@2$i$7$$@.2L$G$"$k(B OpenSSH $B$N(B Unix/Linux
$BMQ$N%Q%C%1!<%8$g$9!#(bopenssh $B$O!"(BSSH1 $B%W%m%H%3%k$N40A4$J3. Papillon v0.4.0a 
$B:nhttp://www.roqe.org/papillon 
$B%W%i%C%H%U%)!<%`(b: Solaris$B!"(BSunOS
$B$^$H$a(B: 
Papillon $B$O!"(BSolaris 8 $BMQ$K@_7W$5$l$?%m!<%@%v%k%+!<%m%k%b%8%e!<%k$g$9!#(b
Openwall Linux $B%+!<%m%k%q%c%a$k?(h/$5$l!"$3$n%q%c%a$n$[$h$s$i$n5!g=$r(b
Solaris $B%+!<%m%k$kdi2c$7$^$9!#@)8b$5$l$?(b proc$B!"(Bchroot $B4D6-$NJ]8n!"%;%-(B
$B%e%"(B STDIO $B%U%!%$%k%G%#%9%/%j%W%?!"@)8B$5$l$?%7%s%\%j%C%/%j%s%/$d%O!<%i(b
$B%j%s%/$J$I!"B??t$N5!G=$,$"$j$^$9!#(B
4. SMB Auditing Tool v1.0.4 
$B:nhttp://www.cqure.net/tools01.html 
$B%W%i%C%H%U%)!<%`(b: Windows 2000$B!"(BWindows XP
$B$^$H$a(B: 
SMB Auditing Tool $B$O!"(BWindows $B$d(B SMB $B%W%i%C%H%U%)!<%`mq$n%q%9%o!<%i4f::(b
$B%D!<%k$g$9!#$3$l$o!"%?%$%`%"%&%h%"!<%-%f%/%a%c%p%0$r967b$k;hmq2dg=$g!"(b
$B$3$l$i$N%W%i%C%H%U%)!<%`$n%q%9%o!<%i$r6k$a$f9bb.$k?db,$7$^$9!#(bwindows 
2000/XP $BMQ$NBg$-$J%Q%9%o!<%i%u%!%$%k$rbp>]$H$7$?5. SMBProxy v1.0.0 
$B:nhttp://www.cqure.net/smbproxy/index.html 
$B%W%i%C%H%U%)!<%`(b: Windows 2000$B!"(BWindows NT
$B$^$H$a(B: 
SMBProxy $B$O!"%W%m%-%7$H$7$FF0:n$9$k!V%O%C%7%e$NFbMF$rE>Aw$9$k!W%D!<%k$g(b
$B$9!#$3$l$O!"(Bmd4 $B%O%C%7%e$N$_$N>pJs$K$h$j(B Windows NT4/2000 $B%5!<%p$h$ng'(b
$B>Z$r2DG=$K$7$^$9!#$^$?!"6&M-%U%)%k%@$X$N%^%&%s%H!"%l%8%9%H%j$X$N%"%/%;(B
$B%9$J$I!"FCDj$N%f!<%68"8b$g%"%/%;%92dg=$g$"$l$p$i$s$j$3$h$g$b2dg=$g$9!#(b
6. Qtfw v0.4b 
$B:nhttp://sourceforge.net/projects/qtfw/ 
$B%W%i%C%H%U%)!<%`(b: FreeBSD
$B$^$H$a(B: 
Qtfw $B$O!"(BFreeBSD $B$N(B ipfw $BMQ$N(B Qt GUI $B%U%m%s%H%(%s%I$G$9!#@vN}$5$lJq3gE*(B
$B$J%f!<%6%$%s%?!<%u%'%$%9$rds6!$7!"(bfreebsd $B$G%U%!%$%d%&%)!<%k$r@_dj$7$d(b
$B$9$/$7$^$9!#%f!<%6$o!"8=:_;hmqcf$n%k!<%k$njt=8!"8e$g;h$&$?$a$k%k!<%k$n(b
$BJ]B8!"%+!<%m%k(b sysctl $BJQ?t$N@_Dj!"(Bgtfw $B%k!<%k$+$i%7%'%k%9%/%j%w%h$n@8@.(b
$B$,2DG=$G$9!#(B
- --
$BLu(B: $B:d0f=g9T(B(SAKAI Yoriyuki), $B1F;3E0:H(B(KAGEYAMA Tetsuya)
$B4F=$(B: $B:d0f=g9T(B(SAKAI Yoriyuki)
LAC Co., Ltd.
http://www.lac.co.jp/security/
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Edition 5.5.5J
Comment: KAGEYAMA Tetsuya
iQA/AwUBPAu/gM32EXDdoEFfEQJ2gwCfSaorqBFRxdo7Yg0ilWqfl05HoDoAnR+Y
JtlggGe/gPmMst3eqs+UgIF1
=RnqJ
-----END PGP SIGNATURE-----

AltStyle $B$K$h$C$FJQ49$5$l$?%Z!<%8(b (->$B%*%j%8%J%k(B) /