-----BEGIN PGP SIGNED MESSAGE-----
JPCERT-WR-2006-4002
JPCERT/CC
2006-10-18
<<< JPCERT/CC REPORT 2006-10-18 >>>
$B!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=(B
$B"#(B10/08($BF|(B)$B!A(B10/14($BEZ(B) $B$N%;%-%e%j%F%#4XO">pJs(B
$B!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=(B
== $BL\(B $B:3J$N@HZ2sHr$N@HR2p$9$k%;%-%e%j%F%#4XO">pJs$NA*Dj4p=`$O0J2<$N%Z!<%8$r$4Mw$/$@$5$$!#(B
http://www.jpcert.or.jp/wr/
$B"((BHTML $BHG$*$h$S(B XML $BHG$O0J2<$N%Z!<%8$r$4Mw$/$@$5$$!#(B
http://www.jpcert.or.jp/wr/2006/wr064002.html
http://www.jpcert.or.jp/wr/2006/wr064002.xml
=============================================================================
$B!Z(B1$B![(BMicrosoft Windows, Office, Internet Explorer $B$KJ#?t$N@HpJs8;(B
US-CERT Technical Cyber Security Alert TA06-283A
Microsoft Updates for Vulnerabilities in Windows, Office, and Internet Explorer
http://www.us-cert.gov/cas/techalerts/TA06-283A.html
US-CERT Cyber Security Alert SA06-283A
Microsoft Updates for Vulnerabilities in Windows, Office, and Internet Explorer
http://www.us-cert.gov/cas/alerts/SA06-283A.html
US-CERT Vulnerability Note VU#187028
Microsoft PowerPoint fails to properly handle malformed object pointers
http://www.kb.cert.org/vuls/id/187028
US-CERT Vulnerability Note VU#938196
Microsoft PowerPoint fails to properly handle malformed data records
http://www.kb.cert.org/vuls/id/938196
US-CERT Vulnerability Note VU#205948
Microsoft PowerPoint malformed record memory corruption
http://www.kb.cert.org/vuls/id/205948
US-CERT Vulnerability Note VU#706668
Microsoft Excel fails to properly process malformed DATETIME records
http://www.kb.cert.org/vuls/id/706668
US-CERT Vulnerability Note VU#143292
Microsoft Excel fails to properly process malformed STYLE records
http://www.kb.cert.org/vuls/id/143292
US-CERT Vulnerability Note VU#703936
Microsoft Object Packager fails to properly display file types
http://www.kb.cert.org/vuls/id/703936
US-CERT Vulnerability Note VU#252500
Microsoft Excel fails to properly process malformed COLINFO records
http://www.kb.cert.org/vuls/id/252500
US-CERT Vulnerability Note VU#821772
Microsoft Excel fails to properly handle Lotus 1-2-3 files
http://www.kb.cert.org/vuls/id/821772
US-CERT Vulnerability Note VU#455604
Microsoft .NET Framework contains a cross-site scripting vulnerability
http://www.kb.cert.org/vuls/id/455604
US-CERT Vulnerability Note VU#547212
Microsoft XML Core Services XMLHTTP ActiveX control fails to properly interpret certain HTTP operations
http://www.kb.cert.org/vuls/id/547212
US-CERT Vulnerability Note VU#820628
Microsoft Server Service fails to properly handle network messages
http://www.kb.cert.org/vuls/id/820628
US-CERT Vulnerability Note VU#534276
Microsoft Office fails to properly parse malformed chart records
http://www.kb.cert.org/vuls/id/534276
US-CERT Vulnerability Note VU#176556
Microsoft Office fails to properly parse malformed records
http://www.kb.cert.org/vuls/id/176556
US-CERT Vulnerability Note VU#234900
Microsoft Office fails to properly parse malformed strings
http://www.kb.cert.org/vuls/id/234900
US-CERT Vulnerability Note VU#807780
Microsoft Office fails to properly parse malformed Smart Tags
http://www.kb.cert.org/vuls/id/807780
US-CERT Vulnerability Note VU#921300
Microsoft Word vulnerable to remote code execution
http://www.kb.cert.org/vuls/id/921300
US-CERT Vulnerability Note VU#562788
Microsoft XML Core Services contain a buffer overflow in the XSLT component
http://www.kb.cert.org/vuls/id/562788
US-CERT Vulnerability Note VU#806548
Microsoft Word 2000 malformed record vulnerability
http://www.kb.cert.org/vuls/id/806548
CIAC Bulletin R-007
Vulnerability in Windows Explorer
http://www.ciac.org/ciac/bulletins/r-007.shtml
CIAC Bulletin R-008
Vulnerabilities in Microsoft PowerPoint
http://www.ciac.org/ciac/bulletins/r-008.shtml
CIAC Bulletin R-009
Vulnerabilities in Microsoft Excel
http://www.ciac.org/ciac/bulletins/r-009.shtml
CIAC Bulletin R-010
Vulnerabilities in Microsoft Word
http://www.ciac.org/ciac/bulletins/r-010.shtml
CIAC Bulletin R-011
Vulnerabilities in Microsoft XML Core Services
http://www.ciac.org/ciac/bulletins/r-011.shtml
CIAC Bulletin R-012
Vulnerabilities in Microsoft Office
http://www.ciac.org/ciac/bulletins/r-012.shtml
CIAC Bulletin R-013
Vulnerability in ASP.NET 2.0
http://www.ciac.org/ciac/bulletins/r-013.shtml
CIAC Bulletin R-014
Vulnerability in Windows Object Packager
http://www.ciac.org/ciac/bulletins/r-014.shtml
$B35MW(B
Microsoft Windows, Office, Internet Explorer $B$K$OJ#?t$N@H\:Y$K$D$$$F$O!"%Y%s%@$,Ds6!$9$k>pJs$r;2>H$7$F$/$@$5$$!#(B
$B4XO"J8=q(B ($BF|K\8l(B)
JP Vendor Status Notes JVNTA06-283A
Microsoft Windows, Office, Internet Explorer $B$K4X$9$k@HpJs(B ($B6[5^(B6$B7o4^(B) $B$K4X$9$kCm0U4-5/(B
http://www.jpcert.or.jp/at/2006/at060017.txt
2006 $BG/(B 10 $B7n$N%;%-%e%j%F%#>pJs(B
http://www.microsoft.com/japan/technet/security/bulletin/ms06-oct.mspx
$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#>pJs(B
ASP.NET 2.0 $B$N@HpJsO3$($$$,5/$3$k(B (922770) (MS06-056)
http://www.microsoft.com/japan/technet/security/bulletin/ms06-056.mspx
$B%^%$%/%m%=%U%H(B $B%;%-%e%j%F%#>pJs(B
Windows Explorer $B$N@HpJs(B
Microsoft PowerPoint $B$N@HpJs(B
Microsoft Excel $B$N@HpJs(B
Microsoft Word $B$N@HpJs(B
Microsoft XML $B%3%"(B $B%5!<%S%9$N@HpJs(B
Microsoft Office $B$N@HpJs(B
Server $B%5!<%S%9$N@HpJs(B
TCP/IP IPv6 $B$N@HpJs(B
Windows $B%*%V%8%'%/%H(B $B%Q%C%1!<%8%c$N@HpJs=hM}?d?J5!9=(B $B%;%-%e%j%F%#%;%s%?!<(B
Windows $B$N(B Server $B%5!<%S%9$N@HpJs8;(B
US-CERT Vulnerability Note VU#788860
Trend Micro OfficeScan Management Console ActiveX control format string vulnerability
http://www.kb.cert.org/vuls/id/788860
CIAC Bulletin R-017
TrendMicro OfficeScan
http://www.ciac.org/ciac/bulletins/r-017.shtml
$B35MW(B
Trendmicro OfficeScan Corporate Edition $B$K$O=q<0J8;zNs$N=hM}$K5/(B
$B0x$9$k@H]$H$J$k%P!<%8%g%s$O0J2<$NDL$j$G$9!#(B
- Trendmicro OfficeScan Corporate Edition 7.3
$B$3$NLdBj$O(B Trendmicro $B$,Ds6!$9$k%Q%C%A$rE,MQ$9$k$3$H$G2r7h$7$^$9!#(B
$B4XO"J8=q(B ($B1Q8l(B)
OfficeScan Corporate Edition(TM) version 7.3 Patch 1 - build 1146
http://www.trendmicro.com/ftp/documentation/readme/osce_73_win_en_patch1_readme.txt
Layered Defense Security Advisories
Layered Defense Research Advisory 1 October 2006
http://www.layereddefense.com/TREND01OCT.html
$B!Z(B3$B![(BAdobe ColdFusion MX 7 $B$K8"8B>:3J$N@HpJs8;(B
CIAC Bulletin R-015
Patch available for ColdFusion MX 7
http://www.ciac.org/ciac/bulletins/r-015.shtml
$B35MW(B
Adobe ColdFusion MX 7 $B$K$O8"8B>:3J$N@H]$H$J$k%P!<%8%g%s$O0J2<$NDL$j$G$9!#(B
- ColdFusion MX 7
- ColdFusion MX 7.0.1
- ColdFusion MX 7.0.2
$B$3$NLdBj$O!"%Y%s%@$,Ds6!$9$k%"%C%W%G!<%?$K(B ColdFusion MX 7 $B$r99(B
$B?7$9$k$3$H$G2r7h$7$^$9!#(B
$B4XO"J8=q(B ($B1Q8l(B)
Adobe Security bulletin
Patch available for ColdFusion MX 7 local privilege escalation
http://www.adobe.com/support/security/bulletins/apsb06-17.html
$B!Z(B4$B![(BX Window System $B$KJ#?t$N@HpJs8;(B
CIAC Bulletin R-005
xfree86 Several Vulnerabilities
http://www.ciac.org/ciac/bulletins/r-005.shtml
$B35MW(B
X Window System $B$NpJs8;(B
CIAC Bulletin R-016
HP Version Control Agent
http://www.ciac.org/ciac/bulletins/r-016.shtml
$B35MW(B
HP Version Control Agent $B$K$O@H]$H$J$k%P!<%8%g%s$O0J2<$NDL$j$G$9!#(B
- Linux $B$*$h$S(B Windows $B>e$GF0:n$9$k(B HP Version Control Agent $B%P!<(B
$B%8%g%s(B 2.1.5 $B$h$jA0$N%P!<%8%g%s(B
$B$3$NLdBj$O!"%Y%s%@$,Ds6!$9$k%Q%C%A$rE,MQ$9$k$3$H$G2r7h$7$^$9!#(B
$B4XO"J8=q(B ($B1Q8l(B)
SUPPORT COMMUNICATION - SECURITY BULLETIN c00786136
HPSBMA02158 SSRT061251 rev.1 - HP Version Control Agent, Remote Unauthorized Access and Possible Elevation of Privilege ($BEPO?$,I,MW$G$9(B)
http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00786136
$B!Z(B6$B![(BKmail CGI $B$KG'>Z2sHr$N@HpJs8;(B
JP Vendor Status Notes JVN#41241092
Kmail CGI $B$K$*$1$kG'>Z2sHr$N@HZ$r2sHr$5$l$k@HZ$r2sHr$5$l!"(B $BMxMQ]$H$J$k%P!<%8%g%s$O0J2<$NDL$j$G$9!#(B
- $B%P!<%8%g%s(B 1.0.3 $B$*$h$S$=$l0JA0(B
$B$3$NLdBj$O!";HMQ$7$F$$$k(B OS $B$N%Y%s%@$dG[I[85$,Ds6!$9$k:G?7$N%P!<(B
$B%8%g%s$K(B Kmail CGI $B$r99?7$9$k$3$H$G2r7h$7$^$9!#(B
$B4XO"J8=q(B ($BF|K\8l(B)
$BFHN)9T@/K!?M(B $B>pJs=hM}?d?J5!9=(B $B%;%-%e%j%F%#%;%s%?!<(B
JVN#41241092$B!V(BKmail CGI$B!W$K$*$1$kG'>Z2sHr$N@HpJs8;(B
JPCERT/CC
$B@HMh$N%W%m%0%i%_%s%0650i$O!"4pK\E*$J%"%k%4%j%:%`$r$I$N$h$&$K%3!<(B
$B%G%#%s%0$9$k$+$,7$$$F$$$^$9!#(B
$B$3$N%;%_%J!<$r](B
$B$H$7$F$$$^$9!#(B
$B>\:Y$K$D$$$F$O(B http://www.jpcert.or.jp/seminar.html
$B$J$*!"Aa4|3d0z$N?=9~$_$,(B 10$B7n(B26$BF|(B($BLZ(B) $B$^$G$H$J$C$F$*$j$^$9!#(B
$B$NJ}$O$*Aa$a$K$*?=$79~$_$/$@$5$$!#(B
$B!Z9V(B $B;U![%m%P!<%H!&(BC$B!&%7!<%3!<%I!!(B( Robert C. Seacord ) $B;a(B
$B!ZBP>]o2A3J(B 50,000$B1_(B($B@G9~(B)
$B"(Ck?)$O4^$^$l$^$;$s(B
$B!Z?=9~J}K!![(B $B%"%9%-!<%S%8%M%9(B $B%*%s%i%$%s%5%$%H$h$j$*?=$79~$_$/$@$5$$(B
http://ascii-business.com/abiz/jpcert/form.html
$B!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=(B
$B"#:#=5$N0l8}%a%b(B
$B!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=!=(B
$B!{(BCSIRT $B$N3hF0FbMF$N@)8B$K$D$$$F(B
CSIRT (Computer Security Incident Response Team) $B$K$O!"(B
constituency ($B%5!<%S%9BP>](B) $B$@$1$G$O$J$/!"(BCSIRT $B$N3hF0L\E*$d=jB0(B
$B$9$kAH?%!"=jB0$9$k9q$NK!E*$J@)8B$J$I$K$h$j!"3hF0FbMF$*$h$S3hF0HO(B
$B0O$O$=$l$>$l0[$J$j!">l9g$K$h$C$F$Ol9g$G$bBP1~$G$-$J$$$3$H$,$"$j$^$9!#(B
$B%$%s%7%G%s%HBP1~$N0l4D$H$7$F!"%$%s%7%G%s%HEv;vpJs$K$D$$$F6qBNE*$JFbMF$=$N$b$N$K(B
$B$D$$$F$N$4l9g$b$"$j$^$9!#$^$?%P%C%/%J%s%P!<$O!"(B
$B0J2<$N(B URL $B$+$i$4MxMQ$$$?$@$1$^$9!#(B
http://www.jpcert.or.jp/wr/
$B!~K\%a!<%j%s%0%j%9%H$N9XFI?=9~$d9XFIDd;_!"$^$?EPO?$7$?EE;R%a!<%k%"%I%l%9(B
$B$NJQ99$J$I$K$D$-$^$7$F$O!"0J2<$N(B URL $B$r$4;2>H$/$@$5$$!#(B
http://www.jpcert.or.jp/announce.html
$B!~(BJPCERT/CC $B$X$N%;%-%e%j%F%#%$%s%7%G%s%H$NJs9pJ}K!$K$D$$$F$O0J2<$N(B URL
$B$r$4;2>H$/$@$5$$!#(B
http://www.jpcert.or.jp/form/
$B0J>e!#(B
__________
2006 (C) JPCERT/CC
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQCVAwUBRTXDGIx1ay4slNTtAQE3vgQAt2ouX9ekPMcpkssXkw5hbhu2r4a7J6Ra
gSa5wKYtfcWMZHxl0nZUPzkPHuufMfhrdQleAmEfJDmiaYAHV3eJWACh9E7lNDxP
dLK8OV2kFCKR1T6m5ivtt4SpXCdRkB7PANXIOuEWNBSFs8XRqk++32O7vj/fRwxh
UeyH0za2DMg=
=JE4K
-----END PGP SIGNATURE-----