English ãç¥ãã 2023å¹´5æ19æ¥ å¯å£«éæ ªå¼ä¼ç¤¾ æ å ±ã»ãã¥ãªãã£å¯¾çã®å¼·åããã³ã·ã¹ãã å質æ¹åã«åããå½ç¤¾ã®åãçµã¿ã«ã¤ã㦠å½ç¤¾ããã³å½ç¤¾ã°ã«ã¼ãä¼ç¤¾ã®åº¦éãªãæ å ±ã»ãã¥ãªãã£ã¤ã³ã·ãã³ããã·ã¹ãã å質ã«é¢ããåé¡ã«ãããã客æ§ãã¯ããé¢ä¿è ã®çæ§ã«å¤å¤§ãªããå¿é ããè¿·æãããããã¦ãããã¨ã«ã¤ãã¦ãããããã¦æ·±ããè©«ã³ç³ãä¸ãã¾ãã æ å ±ã»ãã¥ãªãã£ã«é¢ãã¾ãã¦ã¯ã2021å¹´ã«æ¤ç¥ããããã¸ã§ã¯ãæ å ±å ±æãã¼ã«ãProjectWEBãã¸ã®ä¸æ£ã¢ã¯ã»ã¹ãã¯ããã2022å¹´ã«çºè¦ããã¯ã©ã¦ããµã¼ãã¹ãFJcloud-Vï¼ããã¯ã©ãããFENICSã¤ã³ã¿ã¼ããããµã¼ãã¹ãçã§ã®æ å ±ã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã«ãããå¤ãã®ã客æ§ãé¢ä¿è ã®çæ§ã«å¤å¤§ãªããè¿·æãããããããã¾ãããã¾ããã·ã¹ãã ã®å質ã«é¢ãã¾ãã¦ã¯ãä»è¬ã®ãFujitsu MICJETã³ã³ãã交ä»ãã«é¢é£ããä¸é£
ã¯ããã« 2021å¹´12æã«çºè¦ãããLog4jã®CVE-2021-44228ã¯ãç¨ã«è¦ãã¬ãã«ãã¾ãã«è¶ 弩ç´ã®èå¼±æ§ã¨ãªã£ã¦ãã¾ããä»åãç§ã¯Twitterã主ãªè¶³ãããã¨ãã¦æ å ±åéãè¡ãã¾ãããã(è±èªã»æ¥æ¬èªã©ã¡ãã«ããã¦ã)ããªãWAFãã®ãã®ã話é¡ã«ãªã£ã¦ãããã¨ã«é©ãã¾ããããã人ã¯ãWAFãæ©é対å¿ãã¦ãããããå®å¿ã ï¼ãã¨å«ã³ãå¥ã®äººã¯ãWAFãåé¿ã§ããé£èªåã®æ¹æ³ãè¦ã¤ãã£ããWAFã¯å½¹ã«ç«ããªãï¼ãã¨ä¸»å¼µãããããã«ã¯GitHubã«ãWAFãåé¿ã§ãããã¤ãã¼ã(æ»ææåå)ä¸è¦§ããã¢ãããã¼ããããããã«ã¤ãã¦ãScutumã§ã¯ãã®ãã¿ã¼ã³ãæ¢ã¾ãã¾ããï¼ãã¨åãåãããæ¥ããªã©ãããªãWAFã§ã®é²å¾¡ã¨ãã®åé¿æ¹æ³ã«ã¤ãã¦æ³¨ç®ãéã¾ãã¾ããã å®ã¯WAFã«ããã¦ã¯ããåé¿(Evasionãããã¯Bypass)ãã¨ã®æ¦ãã¯æ°¸é ã®ãã¼ãã§ããããã¯ä»åLog4jã®ä»¶ã§
ã¯ã¬ã¸ããã«ã¼ãæ å ±æ¼ããäºæ ã«é¢ãï¼ãã®åå ã®ä¸ã¤ã¨èããããèå¼±æ§å¯¾å¿ãéç¨ä¿å®æ¥åã«å«ã¾ãã¦ãããå¦ããäºãããäºä¾ã äºæ¡ã®æ¦è¦ Xã¯ï¼Xã®éå¶ããé販ãµã¤ãï¼æ¬ä»¶ãµã¤ãï¼ã第ä¸è ã«éçºå§è¨ãï¼éç¨ãã¦ãããï¼ãã®å¾ï¼2013å¹´1æããã¾ã§ã«ï¼Yã«å¯¾ãï¼æ¬ä»¶ãµã¤ãã®éç¨æ¥åãæé¡20ä¸åã§å§è¨ããï¼æ¬ä»¶å¥ç´ï¼ãæ¬ä»¶ãµã¤ãã¯EC-CUBEã§ä½ããã¦ããããªãï¼XããYã¸ã®æ¥åå§è¨ã«é¢ãï¼å¥ç´æ¸ã¯ä½æããã¦ãããï¼æ³¨ææ¸ã«ã¯ãæ¬ä»¶ãµã¤ãã®éç¨ï¼ä¿å®ç®¡çããECï¼ï¼£ï¼µï¼¢ï¼¥ã«ã¹ã¿ãã¤ãºãã¨ããè¨è¼ããã¦ããªãã 2014å¹´4æã«ã¯ï¼OpenSSL*1ã®èå¼±æ§ããããã¨ãå ¬è¡¨ãããã*2ï¼æ¬ä»¶ãµã¤ãã§ã¯ï¼OpenSSLãç¨ãããã¦ããã 2015å¹´5æããï¼Xã¯ï¼æ±ºæ¸ä»£è¡ä¼ç¤¾ããæ¬ä»¶ãµã¤ãããXã®é¡§å®¢æ å ±ï¼ã¯ã¬ã¸ããã«ã¼ãæ å ±ãå«ãï¼ãæ¼ãããã¦ããæ¸å¿µãããã¨ã®é£çµ¡ãåãï¼æ¬ä»¶æ å ±æ¼ããï¼
ç±³Microsoftã1æã«å ¬éãããMeltdownãã¨å¼ã°ããCPUã®èå¼±æ§å¯¾çããããåå ã§ãWindows 7ã¨Windows Server 2008 R2ã«æ°ããªæ¨©éææ ¼ã®èå¼±æ§ãçºçãã¦ãããã¨ãåãããMicrosoftã3æ29æ¥ã«å ¬éããè¨æã»ãã¥ãªãã£æ´æ°ããã°ã©ã ã§å¯¾å¦ããã Microsoftãç±³ã»ãã¥ãªãã£æ©é¢NCCIC/US-CERTã«ããã¨ãMeltdownã®èå¼±æ§å¯¾çããããã¤ã³ã¹ãã¼ã«ããWindows 7ã¨Windows Server 2008 R2ï¼ãããã64bitçï¼ã§ãã·ã¹ãã ã¡ã¢ãªã®ã³ã³ãã³ããé©åã«ä¿è·ãããªãåé¡ãçºçããã ãã®èå¼±æ§ã¯ãWindowsã«ã¼ãã«ã§ã¡ã¢ãªå ã®ãªãã¸ã§ã¯ããå¦çããæ¹æ³ã«åå¨ãã¦ãããæªç¨ãããã°ã«ã¼ãã«ã¢ã¼ãã§ä»»æã®ã³ã¼ããå®è¡ãããæãããããèå¼±æ§ã«é¢ããæ å ±ã¯ãã»ãã¥ãªãã£ç ç©¶å®¶ã®ããã°ãªã©ã§äºåã«å ¬é
ããã«ã¡ã¯ãã¢ããã¯ã¹ã¿ã¸ãªã§ã»ãã¥ãªãã£ã¨ã³ã¸ãã¢ããã¦ãã岡å´ã§ãã çæ§ãå¹´æ«å¹´å§ã¯ãã£ããã§ãã¾ããã§ãããããç§ã¯å¹´å§ã«å ¬éããããMeltdown and Spectreãã®ãé°ã§å¹´å§æ©ã ãæ å ±æ´çã«è¿½ããã¦ã¾ããã ä»åã¯ãå æ¥ãMeltdown and Spectreãã®èå¼±æ§ã®ãã¨ããããèå¼±æ§æ å ±ã®è¦æ¹ã¨èå¼±æ§æ å ±APIæ´»ç¨ã«ã¤ãã¦ãæ¸ããã¦ããã ãã¾ãã ï¼ï¼èå¼±æ§æ å ±ã®è¦æ¹ ã¨ã³ã¸ãã¢ã®æ¹ã§ããã°ãèå¼±æ§æ å ±ã確èªããä¸ã§CVEãCVSSãªã©ãç®ã«ãããã¨ãå¤ãã¨æãã¾ããããããã©ã®ãããªæå³ãæã¡ãã©ã®ããã«è¦ãã®ããç¥ã£ã¦ããã¾ãããã å æ¥ãã£ããMeltdown and Spectreããä¾ã«è¦ã¦ããã¾ãããã https://meltdownattack.com/ https://spectreattack.com/ ã¾ãããã®ãããªèå¼±æ§æ å ±ãå ¬éãã
å°å·ãã ã¡ã¼ã«ã§éã ããã¹ã HTML é»åæ¸ç± PDF ãã¦ã³ãã¼ã ããã¹ã é»åæ¸ç± PDF ã¯ãªããããè¨äºãMyãã¼ã¸ããèªããã¨ãã§ãã¾ã CPUã®èå¼±æ§ãMeltdownãã¨ãSpectreãã«ããå½±é¿ãç·©åãããããã¯ãWindowsãã·ã³ã ãã§ãªãLinuxãã·ã³ã®æ§è½ã«ãå½±é¿ãåã¼ããã¨ãRed Hatã®æ¤è¨¼ã§å¤æããã èå¼±æ§ã«å¯¾å¦ããã«ã¯ãåºæ¬çã«CPUãã³ãã¼ããæä¾ããããã¤ã¯ãã³ã¼ãã¨ãMicrosoftãRed Hatãªã©ãæä¾ãã¦ããOSãã«ã¼ãã«ã®ããããªã©ãé©ç¨ããå¿ è¦ãããã対çãè¬ãããã¨ã§ãæ å ±çªåãçãèå¼±æ§æªç¨æ»æãªã©ã®å±éºæ§ã使¸ã§ãã䏿¹ãã¯ã¼ã¯ãã¼ãæ§è½ã®ä½ä¸ã¨ããå½±é¿ãä¼´ããMicrosoftã®æ¤è¨¼ã§ã¯ãããã»ããµã®ä¸ä»£ãWindowsã®ãã¼ã¸ã§ã³ã«ãã£ã¦å½±é¿ã¯ç°ãªãããå¤ãCPUç°å¢ã§ã¯ã¦ã¼ã¶ã¼ãå½±é¿ã«æ°ãä»ãå¯è½æ§ãæãã¦ãã
2018å¹´1æ3æ¥ã«CPUã«é¢é£ãã3ã¤ã®èå¼±æ§æ å ±ãå ¬éããã¾ãããå ±åè ã«ããã¨ãããã®èå¼±æ§ã¯MeltdownãSpectreã¨å¼ç§°ããã¦ãã¾ããããã§ã¯é¢é£æ å ±ãã¾ã¨ãã¾ãã èå¼±æ§ã®æ¦è¦ å ±åè ãèå¼±æ§æ å ±ãæ¬¡ã®å°ç¨ãµã¤ãã§å ¬éããã Meltdown and Spectre (ã¾ãã¯ãã¡ã) 3ã¤ã®èå¼±æ§ã®æ¦è¦ãã¾ã¨ããã¨æ¬¡ã®éãã èå¼±æ§ã®åç§° Meltdown Spectre CVE CVE-2017-5754ï¼Rogue data cache loadï¼ CVE-2017-5753ï¼Bounds check bypassï¼ CVE-2017-5715ï¼Branch target injectionï¼ å½±é¿ãåããCPU Intel IntelãAMDãARM CVSSv3 åºæ¬å¤ 4.7(JPCERT/CC) 5.6(NIST) âã«åã PoC å ±åè éå ¬é è«æä¸ã«x
Java Webã¢ããªã±ã¼ã·ã§ã³ãã¬ã¼ã ã¯ã¼ã¯ã®Apache Strutsã«é大ãªèå¼±ï¼ãããããï¼æ§ãçºè¦ãããApache Software Foundationã9æ5æ¥ãæ´æ°çã¨ãªããã¼ã¸ã§ã³2.5.13ãå ¬éãã¦å¯¾å¦ãããããã«æ»æãçºçããå¯è½æ§ãææãããé¢ä¿è ã¯ç´ã¡ã«æ´æ°çãé©ç¨ããããå¼ã³æãã¦ããã ä»åã®èå¼±æ§ã¯ããªã¼ãã³ã½ã¼ã¹ããã¸ã§ã¯ãåãã®ç¡æã³ã¼ãæ¤è¨¼ãµã¼ãã¹ãlgtm.comããæä¾ãã¦ããç±³Semmleã®ç ç©¶è ãçºè¦ãããå社ã«ããã¨ã2008年以éã«ãªãªã¼ã¹ãããStrutsã®å ¨ãã¼ã¸ã§ã³ã«èå¼±æ§ããããåãã¬ã¼ã ã¯ã¼ã¯ã®RESTãã©ã°ã¤ã³ã使ã£ã¦ããå ¨ã¦ã®Webã¢ããªãå½±é¿ãåããã èå¼±æ§ã¯ãä¿¡é ¼ã§ããªããã¼ã¿ãéç´ååããæ¹æ³ã«èµ·å ãã¦ããã¨ãããæªç¨ãããå ´åãStrutsã¨RESTã使ã£ã¦éçºãããã¢ããªã±ã¼ã·ã§ã³ãå®è¡ãã¦ãããµã¼ãä¸ã§ããªã¢
2026-03-02 gh CLI à Claude Code ã§ GitHub Actions 失æãã°ããã£ããã§å³è§£æ±º
SBãã¯ããã¸ã¼æ ªå¼ä¼ç¤¾ã¯ã2026å¹´4æ1æ¥ä»ã§ãã½ãããã³ã¯æ ªå¼ä¼ç¤¾ãåç¶ä¼ç¤¾ã¨ããå¸ååä½µã«ããã½ãããã³ã¯æ ªå¼ä¼ç¤¾ã«çµ±åããã¾ããã ããã¾ã§SBãã¯ããã¸ã¼æ ªå¼ä¼ç¤¾ããæé¡§ããã ãã¾ããã客ãã¾ããåå¼å ã®çãã¾ãã¯ãããé¢ä¿è ã®çãã¾ã«å¿ãã御礼ç³ãä¸ãã¾ãã ä»å¾ãSBãã¯ããã¸ã¼æ ªå¼ä¼ç¤¾ã«é¢ããæ å ±ããã³ãµã¼ãã¹ã«ã¤ãã¾ãã¦ã¯ãã½ãããã³ã¯æ ªå¼ä¼ç¤¾ã®ã¦ã§ããµã¤ãã«ã¦ãæ¡å ãããã¾ãã å¼ãç¶ããæ¯æ´è³ãã¾ããããé¡ãç³ãä¸ãã¾ãã
ç¾å¨ãµãã¼ãæéä¸ã®Windowsã®ãã¼ã¸ã§ã³ã§ããWindows 7ã¨Windows 8.1ã«NTFSã«é¢é£ããä¸å ·åãåå¨ãããã¨ãåããã¾ãã(Ars TechnicaãThe Verge)ã ä¸å ·åã¯ãNTFSãã¡ã¤ã«ã·ã¹ãã ã®ã¡ã¿ãã¼ã¿ãæ±ãããã«åå¨ããç¹å¥ãªãã¡ã¤ã«"$MFT"ã«é¢é£ãããã®ã§ãWindowsã¯é常ãããã°ã©ã ãããã®ãã¡ã¤ã«ã¸ã®ã¢ã¯ã»ã¹ããããã¯ãã¦ãã¾ããã"$MFT"ããã¹ã®ä¸é¨ã«å«ã¾ããå ´åã«åãæ±ãã«å¤±æããçµæã¨ãã¦ã·ã¹ãã ãé ããªã£ãããæçµçã«ã¯ã©ãã·ã¥ãããããç¾è±¡ãçºçããã¨ã®ãã¨ã§ãã ä¾ãã°"c:\$MFT\123"ã¨ãããããªãã¡ã¤ã«ãInternet Explorerã§éããã¨ããã¨ãã®ä¸å ·åãçºçãããã¨ãããæªæãæã£ãWebãµã¤ãã«å«ã¾ããã"$MFT"ãå«ã䏿£ãªã³ã¯ãã¯ãªãã¯ãããã¨ã§ã·ã¹ãã ãã¯ã©ãã·ã¥ããå¯è½æ§ãããã
StrutsããSpringã¸ã®ç§»è¡ãµã¼ãã¹ãªã©ãæä¾ãã¦ããæ ªå¼ä¼ç¤¾ã¹ã¿ã¤ã«ãºã¯ã4æ24æ¥ãã»ããã¼ã¤ãã³ããæ·±å»åããStrutsèå¼±æ§ã«ã©ã対å¦ãããï¼ããéå¬ãããJavaã®Webã¢ããªã±ã¼ã·ã§ã³ãã¬ã¼ã ã¯ã¼ã¯ãStrutsãã®ããªã¢ã¼ãããä»»æã®ã³ã¼ããå®è¡å¯è½ãªèå¼±æ§ã«ãããããã¤ãã®éè¦ãªãµã¤ãã§æ å ±æ¼æ´©ãæµåºãããã¨ãåãã¦ã®ãã®ã ã ã¤ãã³ãã«ã¯ã»ãã¥ãªãã¤å°éå®¶ã§HASHã³ã³ãµã«ãã£ã³ã°æ ªå¼ä¼ç¤¾ä»£è¡¨ã®å¾³ä¸¸æµ©æ°ãç»å£ãã¦ãStrutsã®èå¼±æ§ã®äºä»¶ããã®ä»ã®Webèå¼±æ§ã¸ã®å¯¾å¿ã«ã¤ãã¦è§£èª¬ãããã¾ããã¹ã¿ã¤ã«ãºã¯Strutsããã®ç§»è¡ãµã¼ãã¹ã«ã¤ãã¦è©³ããç´¹ä»ããã åºæ¬æ½çããããé©ç¨å®¹ææ§ãå¤å±¤é²å¾¡ã§å®ã徳丸æ°ã¯ã¾ããä¸é£ã®äºä»¶ã®ãã¡å½±é¿ã大ããGMOãã¤ã¡ã³ãã²ã¼ãã¦ã§ã¤ã®äºä»¶ãåãä¸ãããå社ã®å ¬å¼çºè¡¨ãã¡ãã£ã¢ã®å ±éå 容ããã対å¿å 容ãè¦ã¦ããå ¨ä½ã¨ãã¦ã¯ã¹ã
2017å¹´5æ12æ¥é ãããä¸çåå°ã§ã©ã³ãµã ã¦ã§ã¢ã«ææãã被害ãç¸æ¬¡ãã§å ±åããã¦ãã¾ããã©ã³ãµã ã¦ã§ã¢ã¯WannaCryçã¨ååãä»ãããã¦ãããã®ã§ãããã«ææããåå ã¨ãã¦ãWindowsã®èå¼±æ§ãåã³ãã®èå¼±æ§ãç¨ããNSAãéçºãããã¼ã«ãé¢ä¿ãã¦ããå¯è½æ§ãããã¨åå½ã®CSIRTãã»ãã¥ãªãã£ãã³ããæ³¨æåèµ·çãå ¬éãã¦ãã¾ããMicrosoftã¯ä»åã®ææäºæ¡ãåããWindowsXPãªã©ã®ãµãã¼ããåããOSã対象ã¨ããç·æ¥ã®æ´æ°ããã°ã©ã ãå ¬éãã¾ããã ããã§ã¯ãã®ä¸çä¸ã§çºçããã©ã³ãµã ã¦ã§ã¢ WannaCry ã®ææè¢«å®³ãªã©ã«ã¤ãã¦ã¾ã¨ãã¾ãã ã¤ã³ã·ãã³ãã¿ã¤ã ã©ã¤ã³ 以ä¸ã¯ä¸»ã«å½å ã®é¢é£äºè±¡ãæ´çãããã®ã æ¥æ åºæ¥äº 2016å¹´9æ16æ¥ MicrosoftãSMBv1ã®ä½¿ç¨åæ¢ãå¼·ãæ¨å¥¨ããè¨äºãå ¬éã 2017å¹´1æ16æ¥ US-CERTãSMBv1
ç±³Microsoftã®æ§ãã¼ã¸ã§ã³ã®Windowsèå¼±æ§ãæªç¨ãããã©ã³ãµã ã¦ã§ã¢æ»æãã5æ12æ¥ãä¸»ã«æ¬§å·ãã¢ã¸ã¢ã®ç´100ã«å½ã§çºçããè±å½ã®å½å¶å»çæ©é¢ãæ©è½åæ¢ãããªã©ã®è¢«å®³ãåºãã ã»ãã¥ãªãã£ã½ãããã³ãã¼ã®Avastã«ããã¨ãæ»æã«ä½¿ãããã®ã¯ãç±³å½å®¶å®å ¨ä¿éå±ï¼NSAï¼ã®ãããã³ã°ãã¼ã«æµåºã«ãããã£ãã¨ãããéå£ãShadow BrokersããæµåºããããWannaCryãã¨ãå¼ã°ããã©ã³ãµã ã¦ã§ã¢ããWanaCrypt0r 2.0ãã¨ããã ã©ã³ãµã ã¦ã§ã¢ã¨ã¯ãã¡ã¼ã«å ã®URLãã¯ãªãã¯ãããªã©ãã¦ææããã¨ãPCå ã®ãã¼ã¿ãéããªããªãã解決ã®ããã®â身代éâãæ¯æãããè¦æ±ããã¨ãããã®ã ã Microsoftã¯3æã«æ¢ã«ãã®æ»æã«ä½¿ãããèå¼±æ§ã«å¯¾å¦ãã¦ãããã忥ä¸ã«ãæ¢ã«ãµãã¼ãæéãçµäºãã¦ãããWindows XPããWindows 8ããWindow
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}