2020å¹´1æ17æ¥ãMicrosoftã¯Internet Explorerã«æ·±å»ãªèå¼±æ§ãåå¨ãçºè¡¨æç¹ã§ã¾ã ä¿®æ£ä¸ã§ãããã¨ãæããã«ãã¾ãããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã ï¼ï¼æ¦è¦ç·¨ â ãã¾ä½ãèµ·ãã¦ããã®ï¼ï¼1æ17æ¥æç¹ï¼ ãµãã¼ãããã¦ããå ¨ã¦ã®Internet Explorerã«æ·±å»ãªèå¼±æ§ãèå¼±æ§ã¯CVE-2020-0674ãæ¡çªã1æ11æ¥æç¹ã®CVSSã¹ã³ã¢ï¼ç¾ç¶å¤ï¼ã¯7.1ã 17æ¥æç¹ã§ä¿®æ£ä¸ã§ããæ´æ°ããã°ã©ã ãå ¬éããã¦ããªããéå®çãªãããã®èå¼±æ§ãæªç¨ããæ»æã確èªããã¦ããã 2020å¹´1æ14æ¥ã«ãµãã¼ãæéãè¿ããã°ããã®Windows 7ãå½±é¿ãåãããæ´æ°ããã°ã©ã ã®æä¾ã¯æè¨ããªãããMicrosoftãçºè¡¨ãã対象ã®ãªã¹ãã«å«ã¾ãã¦ããã â¡ ãã®èå¼±æ§ã®å½±é¿ãåããã¨ã©ããªãã®ï¼ ãªã¢ã¼ãããä»»æã®ã³ã¼ãå®è¡ãå¯è½ãªèå¼±æ§ãåå¨ããæª
by Uwe Hermann 2018å¹´ã«è¤æ°è¦ã¤ãã£ãèå¼±æ§ã«ç¶ãã¦ãIntel製CPUã«æ°ããªèå¼±æ§ãè¦ã¤ããã¾ããããSPOILERãã¨åä»ãããããã®èå¼±æ§ã¯ã2018å¹´ã«è¦ã¤ãã£ãèå¼±æ§ã»ãMeltdownãããSpectreãã¨åæ§ã«ãææ©çå®è¡ãã¨å¼ã°ããå¦çãæªç¨ãããã®ã§ãã·ãªã³ã³ã¬ãã«ã§ã®å¤§å¹ ãªåè¨è¨ãªãã«ã¯ä¿®æ£ã¯ã§ããªããã®ã ããã§ãã SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks (PDFãã¡ã¤ã«)https://arxiv.org/pdf/1903.00446.pdf SPOILER alert, literally: Intel CPUs afflicted with simple data-spewing spec-exec vulnerability ⢠The Reg
2018å¹´1æ3æ¥ã«CPUã«é¢é£ãã3ã¤ã®èå¼±æ§æ å ±ãå ¬éããã¾ãããå ±åè ã«ããã¨ãããã®èå¼±æ§ã¯MeltdownãSpectreã¨å¼ç§°ããã¦ãã¾ããããã§ã¯é¢é£æ å ±ãã¾ã¨ãã¾ãã èå¼±æ§ã®æ¦è¦ å ±åè ãèå¼±æ§æ å ±ã次ã®å°ç¨ãµã¤ãã§å ¬éããã Meltdown and Spectre (ã¾ãã¯ãã¡ã) 3ã¤ã®èå¼±æ§ã®æ¦è¦ãã¾ã¨ããã¨æ¬¡ã®éãã èå¼±æ§ã®å称 Meltdown Spectre CVE CVE-2017-5754ï¼Rogue data cache loadï¼ CVE-2017-5753ï¼Bounds check bypassï¼ CVE-2017-5715ï¼Branch target injectionï¼ å½±é¿ãåããCPU Intel IntelãAMDãARM CVSSv3 åºæ¬å¤ 4.7(JPCERT/CC) 5.6(NIST) âã«åã PoC å ±åè éå ¬é è«æä¸ã«x
森永ã§ãã æ°å¹´æ©ã 大å¤ãªèå¼±æ§ãåºã¦ãã¦ã»ãã¥ãªãã£ã¯ã©ã¹ã¿ãããã¤ãã¦ã¾ãã å 容ã«ãã£ã¦2ã¤ã®èå¼±æ§ã«åããã¦ãã¦ããMeltdownãã¨ãSpectreãã¨ååãã¤ãããã¦ãã¾ãã ç¾å¨ä½¿ç¨ããã¦ããã»ã¼å ¨ã¦ã®CPUã«ããã¦å¯¾è±¡ã¨ãªãããã¨ããç¸å½å½±é¿ç¯å²ãåºãèå¼±æ§ã§ãã ã¾ã 詳細ãå ¬éããã¦ããªãé¨åãããã¾ããããããã§å¯¾å¦ã§ããèå¼±æ§ã§ãã®ã§è½ã¡çãã¦å¯¾å¿ããç¶å ±ãå¾ ã¡ã¾ãããã ç¾å¨åãã£ã¦ããç¯å²ã®æ å ±ãã¾ã¨ãã¾ãã Meltdown and Spectre æ¦è¦ ä»åã®èå¼±æ§ã¯å¤§ãã3ã¤ã«åãããã¾ãã Variant 1: bounds check bypass (CVE-2017-5753) Variant 2: branch target injection (CVE-2017-5715) Variant 3: rogue data cache load (CV
ç±³Intelã¯1æ3æ¥ï¼ç¾å°æéï¼ãè¤æ°ã®ã»ãã¥ãªãã£ç 究è ãé示ããããã»ããµã®2ã¤ã®èå¼±æ§ã«ã¤ãã¦ããã®åé¡ã¯Intelã®ããã»ããµåºæã®ãã®ã§ã¯ãªããç±³AMDãè±ArmãOSæä¾ä¼æ¥ãªã©ã¨å¯¾çã®ããã«ååãã¦ããã¨èª¬æããã ãã®èå¼±æ§ã¯ããªã¼ã¹ããªã¢ã®ã°ã©ã¼ãå·¥ç§å¤§å¦ãç±³Googleã®ç 究è ãçºè¦ãããMeltdownãã¨ãSpectreãã¨åä»ãããã¾ã 対çã¯ãªãããIntelã¯ãç¾å¨ã®ã¡ãã£ã¢ã«ããä¸æ£ç¢ºãªå ±éã«å¯¾å¦ããããããèå¼±æ§ã®åå¨ãèªãã声æãåºããã¨ãã¦ãããå ·ä½çãªå¯¾çã«ã¤ãã¦ã¯ã対çã®ããã®ã½ããã¦ã§ã¢ããã³ãã¡ã¼ã ã¦ã§ã¢ã®ã¢ãããã¼ããå¯è½ã«ãªãæ¥é±çºè¡¨ãããã¨ããã Intelã«ããã¨ããã®èå¼±æ§ãæªç¨ãããã¨ãã¼ã¿ãçã¾ããå¯è½æ§ã¯ãããããã¼ã¿ãæ¹ããããããåé¤ãããããããã¨ã¯ãªãã¨ããã ã¦ã¼ã¶ã¼ããã®èå¼±æ§ã«å¯¾å¦ããããã«ã¯ãå社ã®ããã»ããµãæ
ç±³Intelãçºè¡¨ããããã»ããµã®é大ãªèå¼±æ§ã«ã¤ãã¦ã®ã¾ã¨ããµã¤ããéè¨ããããè¤æ°ã®ã»ãã¥ãªãã£ç 究è ãçºè¦ãã2ã¤ã®èå¼±æ§ãMeltdownãã¨ãSpectreãã«ã¤ãã¦ãåºæ¬çãªèª¬æããããæè¡çãªæ å ±ããã³å½±é¿ãåãããµã¼ãã¹ã製åãæä¾ããä¼æ¥ã®å ¬å¼ãµã¤ãã¸ã®ãªã³ã¯ãªã©ãæ²è¼ããã¦ããã ãã®ãµã¤ãã¯2ã¤ã®èå¼±æ§ãçºè¦ããçµç¹ã®1ã¤ã§ãããªã¼ã¹ããªã¢ã®ã°ã©ã¼ãå·¥ç§å¤§å¦ãéè¨ãããMeltdownï¼å´©å£ï¼ã¨ããå称ã¯ããã®èå¼±æ§ãæ£å¸¸ã§ããã°ãã¼ãã¦ã§ã¢ã«ãã£ã¦å®ãããã¯ãã®ã»ãã¥ãªãã£å¢çãå´©å£ããããã¨ããä»ããããã¨ãããSpectreï¼å¹½éï¼ã¯ãspeculative executionï¼ææ©çå®è¡ï¼ã³ã³ãã¥ã¼ã¿ã«å¿ è¦ã¨ããªããããããªãä»äºãããããã¨ï¼ããæ¥ã¦ããããä¿®æ£ãé£ãããé·ãæ©ã¾ãããå¯è½æ§ããããã¨ã示ãã¦ããã¨ããã 2ã¤ã®èå¼±æ§ã¯å人ç¨ã®PCã ãã§ãªã
Meltdown and Spectre Vulnerabilities in modern computers leak passwords and sensitive data. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spec
We have discovered that CPU data cache timing can be abused to efficiently leak information out of mis-speculated execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts. Variants of this issue are known to affect many modern processors, including certain processors by Intel, AMD and ARM. For a few Intel and AMD CPU models
by Sh4rp_i ãã10å¹´éã«è£½é ãããIntelã®ããã»ããµã«ãè¨è¨ä¸ã®æ¬ é¥ãè¦ã¤ããã¾ãããææªã®å ´åããã¹ã¯ã¼ãããã°ã¤ã³ãã¼ããã£ãã·ã¥ãã¡ã¤ã«ãªã©ãæ ¼ç´ãããã«ã¼ãã«ã¡ã¢ãªã¼ã®å 容ãèªã¿åãããæããããã¨ã®ãã¨ãªã®ã§ãããIntel x86ãã¼ãã¦ã§ã¢ã«åå¨ããæ¬ é¥ã®ããããã¤ã¯ãã³ã¼ãã¢ãããã¼ãã§ã¯å¯¾å¿ä¸å¯è½ã§ãåOSãã½ããã¦ã§ã¢ã¬ãã«ã§ä¿®æ£ãããããããã°ã®ãªãæ°ããªããã»ããµãå°å ¥ããå¿ è¦ãããã¨ã®ãã¨ã 'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign ⢠The Register https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ ãã®ãã°ã¯ããã¼ã¿ãã¼ã¹ã¢ããªã±ã¼ã·ã§
Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign Final update A fundamental design flaw in Intel's processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug. Programmers are scrambling to overhaul the open-source Linux kernel's virtual memory system. Meanwhile, Microsoft is expected to publicly introduce
æ å ±å¦çæ¨é²æ©æ§ï¼IPAï¼ã¨JPCERTã³ã¼ãã£ãã¼ã·ã§ã³ã»ã³ã¿ã¼ï¼JPCERT/CCï¼ãå ±åã§éå¶ããèå¼±æ§æ å ±ãéããWebãµã¤ããJVNâ¼ãã§2015å¹´1æ28æ¥ãUNIXç³»OSã®Linuxã«å«ã¾ããGNU Cã©ã¤ãã©ãªâ¼ï¼glibcï¼ã«èå¼±æ§ãGHOSTâ¼ããããã¨å ¬è¡¨ãããã¨ãå½å ã®å ±éæ©é¢ã¯ä¸æã«ãã®èå¼±æ§ã«é¢ãããã¥ã¼ã¹ãé ä¿¡ãã¾ãããJVNãåèã«ããã®ã¯ãã»ãã¥ãªãã£èå¼±æ§æ¤ç¥ãµã¼ãã¹ãæä¾ããç±³ã¯ã©ãªã¹ã2015å¹´1æ27æ¥ï¼ç¾å°æéï¼ã«å ¬éããã¬ãã¼ãã§ãã
Operators of vulnerable servers need to take action. There is nothing practical that browsers or end-users can do on their own to protect against this attack. Is my site vulnerable? Modern servers and clients use the TLS encryption protocol. However, due to misconfigurations, many servers also still support SSLv2, a 1990s-era predecessor to TLS. This support did not matter in practice, since no up
2016å¹´3æ1æ¥(ç¾å°æé)ãOpenSSL ããã¸ã§ã¯ãã¯èå¼±æ§ã®æ称ãDROWNãããCacheBleedããå«ã8件ã®èå¼±æ§æ å ±ãå ¬éãããããå½±é¿ãåãããã®ã®ä¿®æ£ãè¡ã£ãææ°çããªãªã¼ã¹ãã¾ãããããã§ã¯é¢é£æ å ±ãã¾ã¨ãã¾ãã èå¼±æ§æ å ±æ¦è¦ 注æåèµ· OpenSSL ã®è¤æ°ã®èå¼±æ§ã«é¢ãã注æåèµ· - JPCERT/CC SSLv2 DROWN Attack - US-CERT OpenSSL Projectã®å ¬éæ å ± Forthcoming OpenSSL releases OpenSSL Security Advisory ï¼»1st March 2016ï¼½ OpenSSL version 1.0.1s published OpenSSL version 1.0.2g published An OpenSSL Userâs Guide to DROWN 2016å¹´3æ1æ¥å ¬
åãã ãã®æ å ±ã¯ä¸è¨ãã CVE-2015-7547: Critical Vulnerability in glibc getaddrinfo https://isc.sans.edu/forums/diary/CVE20157547+Critical+Vulnerability+in+glibc+getaddrinfo/20737/ getaddrinfo() ã使ã£ã¦ãå ´åã«ãå½±é¿ãåããå¯è½æ§ãããã¾ãã ãã§ã« PoC ã¯å ¬éããã¦ãã¦ãã¾ãã https://github.com/fjserna/CVE-2015-7547 ããã«å ¬éããã¦ãã CVE-2015-7547-proc.py ã¨ãã root 権éä»ãã§å®è¡ããã¨ããã®æã® buffer overflow ãå¼ãèµ·ãããã±ãããè¿ãã¦ãã DNSãã£ãã·ã¥ãµã¼ããã©ãã«ãªã£ã¦ããã¾ãã ããããã¼ã«ã«ã§åãããç¶æ
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}