ラベル HTTPレスポンス分割攻撃 の投稿を表示しています。 すべての投稿を表示
ラベル HTTPレスポンス分割攻撃 の投稿を表示しています。 すべての投稿を表示

2011-05-05

Canonical Ltd. Ubuntu Linux, Sun Solaris 10

ソフト名:Canonical Ltd. Ubuntu Linux 6.06/8.04/10.04/10.10, Sun Solaris 10 (perl, CGI.pm)
回避策:USN-1129-1にて対応, あり
脆弱性:セキュリティ制限の回避, XSS, perlコード実行, HTTPレスポンス分割攻撃, HTTPヘッダインジェクション
CVE:CVE-2010-1168, CVE-2010-1447, CVE-2010-2761, CVE-2010-4410, CVE-2010-4411, CVE-2011-1487
危険性:Medium Risk

2011-02-09

Novell openSUSE, Novell SUSE Linux Enterprise Server

ソフト名:Novell openSUSE 11.1~11.3, Novell SUSE Linux Enterprise Server 10/11
回避策:SUSE-SR:2011:003にて対応
脆弱性:セキュリティ制限の回避, XSS, データ操作, 機密情報の奪取, DoS攻撃, システムアクセス, HTTPレスポンス分割攻撃
ソース:
http://www.opensuse.org/en/
http://www.novell.com/promo/home/sle11.html
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html
http://secunia.com/advisories/37291/
http://secunia.com/advisories/42337/
http://secunia.com/advisories/42443/
http://secunia.com/advisories/42461/
http://secunia.com/advisories/42659/
http://secunia.com/advisories/43006/
http://secunia.com/advisories/43023/
http://secunia.com/advisories/43135/
http://secunia.com/advisories/43236/
http://dvw-j.blogspot.com/2010/12/cgipm-cgisimple.html
http://dvw-j.blogspot.com/2010/12/pcsc-lite.html
http://dvw-j.blogspot.com/2011/01/isc-dhcp.html
http://dvw-j.blogspot.com/2011/01/opera-software-opera.html
http://dvw-j.blogspot.com/2011/02/canonical-ltd-ubuntu-linux_8844.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3782
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0025
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0681
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0682
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0683
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0684
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0685
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0687
CVE:CVE-2009-3555, CVE-2010-3782, CVE-2010-4172, 2010-4410, CVE-2010-4411, CVE-2010-4530, CVE-2010-4531, CVE-2011-0025, CVE-2011-0413, CVE-2011-0681, CVE-2011-0682, CVE-2011-0683, CVE-2011-0684, CVE-2011-0685, CVE-2011-0686, CVE-2011-0687
危険性:High Risk

2011-02-04

Red Hat Fedora

ソフト名:Red Hat Fedora 13/14
回避策:FEDORA-2011-0741, FEDORA-2011-0755にて対応
脆弱性:セキュリティ制限の回避, XSS, ブルートフォース攻撃, HTTPレスポンス分割攻撃, CSRF, スクリプトの挿入, 不正アクセス, HTTPヘッダインジェクション, 不正HTMLの挿入, 不正HTMLのリクエスト
ソース:
https://fedoraproject.org/wiki/F13_one_page_release_notes
http://fedoraproject.org/
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html
http://secunia.com/advisories/43033/
http://secunia.com/advisories/43165/
http://dvw-j.blogspot.com/2011/01/mozilla-foundation-bugzilla.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0048
CVE:CVE-2010-2761, CVE-2010-4411, CVE-2010-4567, CVE-2010-4568, CVE-2010-4572, CVE-2011-0046, CVE-2011-0048
危険性:Medium Risk

2011-01-26

2011-01-14

Novell openSUSE, Novell SUSE Linux Enterprise Server

ソフト名:Novell openSUSE 11.1~11.3, Novell SUSE Linux Enterprise Server (SLES) 10/11
回避策:SUSE-SR:2011:001にて対応
脆弱性:セキュリティ制限の回避, XSS, 機密情報の奪取, 権限の昇格, DoS攻撃, 不正アクセス, スタックオーバーフロー, デリファレンスエラー, システムのクラッシュ, 無限ループ, バウンダリエラー, コード実行, HTTPレスポンス分割攻撃, HTTPヘッダインジェクション
ソース:
http://www.opensuse.org/en/
http://www.novell.com/promo/home/sle11.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
http://secunia.com/advisories/39661/
http://secunia.com/advisories/40112/
http://secunia.com/advisories/40783/
http://secunia.com/advisories/41535/
http://secunia.com/advisories/41841/
http://secunia.com/advisories/42290/
http://secunia.com/advisories/42373/
http://secunia.com/advisories/42461/
http://secunia.com/advisories/42473/
http://secunia.com/advisories/42732/
http://secunia.com/advisories/42877/
http://dvw-j.blogspot.com/2010/12/pidgin.html
http://dvw-j.blogspot.com/2010/12/openssl.html
http://dvw-j.blogspot.com/2010/12/cgipm-cgisimple.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2283
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2284
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2992
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2994
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3912
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4254
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528
CVE:CVE-2010-1455, CVE-2010-2283, CVE-2010-2284, CVE-2010-2285, CVE-2010-2286, CVE-2010-2287, CVE-2010-2761, CVE-2010-2891, CVE-2010-2992, CVE-2010-2993, CVE-2010-2994, CVE-2010-2995, CVE-2010-3445, CVE-2010-3912, CVE-2010-4180, CVE-2010-4254, CVE-2010-4300, CVE-2010-4301, CVE-2010-4528
回避策:High Risk

2010-06-30

Cisco ASA 5580 8.1(1)

ソフト名:Cisco ASA 5580 8.1(1)
回避策:Cisco ASA 5580 Series Release Notes April 6, 2009にて対応
脆弱性:HTTPレスポンス分割攻撃, XSS, Webキャッシュ汚染
ソース:
http://www.cisco.com/en/US/docs/security/asa/asa81/release/notes/asarn812.html
http://www.secureworks.com/ctu/advisories/SWRX-2010-001/
http://www.securityfocus.com/bid/41159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7257
http://securitytracker.com/alerts/2010/Jun/1024155.html
CVE:CVE-2008-7257
危険性:Medium Risk

Marco Cimmino Cimy Counter for WordPress

ソフト名:Marco Cimmino Cimy Counter for WordPress 0.9.4
回避策:アップデートにて対応
脆弱性:機密情報の奪取, セキュリティの強度不足, HTTPレスポンス分割攻撃, XSS, Webキャッシュ汚染, 認証資格情報の奪取
ソース:
http://www.exploit-db.com/exploits/14057/
http://wordpress.org/extend/plugins/cimy-counter/
危険性:Medium Risk

2010-03-29

Interchange

ソフト名:Interchange 5.4.1~5.4.4, 5.6.0~5.6.2
回避策:アップデートで対応
脆弱性:HTTPレスポンス分割攻撃, XSS, Webキャッシュ汚染, 機密情報の奪取
ソース:http://ftp.icdevgroup.org/interchange/WHATSNEW
http://www.securityfocus.com/bid/38960
http://secunia.com/advisories/39103
危険性:Medium Risk

2010-01-23

cPanel

cPanel 11.25 build 42174
未対応
HTTPレスポンス分割攻撃
XSS
Webキャッシュ汚染
機密情報の奪取
http://www.exploit-db.com/exploits/11211