æ¦è¦SSVC 㧠Deployer Tree ã使ãéã«ãHUMAN IMPACT ã®è¨å®ã«æ¸æããã¨ãå¤ãã¨æãã¾ããSSVC ã®å®ç¾©ä¸ã§ããè¤éãªã®ã§è©³ç´°ãé¿ãããã¦ããããã«è¦ãã¾ãã ã¾ããå®éç¨ä¸ã§ããèå¼±æ§ã²ã¨ã¤ãã¤ãHUMAN IMPACT ãå®ç¾©ãããã¨ã¯é£ããï¼èå¼±æ§æ¯ã«å®ç¾©ããããã¨ã«ãªãï¼ãä½ããã®æ¨æºåãå¿ è¦ã¨ãªãã¾ãã æ¬è¨äºã§ã¯ãSSVC ã®å®ç¾©ä¸ã§ã® HUMAN IMPACT ã«ã¤ãã¦ç¢ºèªããå®éç¨ä¸ã®HUMAN IMPACTã®å®ç¾©ã§å©ç¨ã§ããããªãã¬ã¼ã ã¯ã¼ã¯ããç´¹ä»ãã¾ãã Exective summaryæ¬æ¥çã« HumanImpact ã¯ãSituated Safety Impact 㨠Mission Impact ããã¨ã«èããã®ãè¯ãã¨æããã¦ãã¾ãã ããããªããç¾æç¹ã® SSVC ã®èãæ¹ã§ã¯ãå®è£ ã®ç°¡ç´ åã®ãããMission Impact
2024å¹´8æ20æ¥ã«éå¬ããããVulsç¥ã#10 | èå¼±æ§ç®¡çã®æåç·ããªã¹ã¯è©ä¾¡ããSSVCãVEXãAIã¾ã§ããã®ã»ãã·ã§ã³ããæ®æ¥ï¼ æ¥é±ã§OK?ãéæåå¾ã®èå¼±æ§å¯¾å¿å¤æã«ä½¿ããSSVCã®ã㢠ãã®è¦ç¹ãæ¸ãèµ·ããè¨äºã§ãã YouTubeã¢ã¼ã«ã¤ãã¯ãã¡ãã§ãã ä¼å ´ã¸ã®è³ªå å æ¥IPAã®ä¸æ ¸äººæè²æããã°ã©ã åæ¥ããã¸ã§ã¯ãããããèå¼±æ§å¯¾å¿ã«ããããªã¹ã¯è©ä¾¡ææ³ã®ã¾ã¨ããã¨ããè³æãå ¬éããã¾ããããã®è³æã¯æ¬æ¥ç´¹ä»ããSSVCãEPSS, KEVãªã©ãæ¥æ¬èªã§ãããããã説æããã¦ãããã¾ãããªã¢ã¼ã¸ã«ã¤ãã¦ããã¤ãã®æ¹æ³ãè¨è¼ããã¦ããã®ã§ä¸èªããããããã¾ããããã®ä¸ã§ãã®å³ã®éã60社ã¸ã®ä¼æ¥ã«ã¢ã³ã±ã¼ããåã£ã¦ãã¾ãã æå¤ã«ããã£ãã®ããCVSSã®ç°å¢è©ä¾¡åºæºã60社ä¸15社ã使ã£ã¦ããç¹ã§ããç§ã¯2016å¹´ã«Vulsãéçºãã¦ä»¥éèå¼±æ§ç®¡çããã¼ãã«æ´»å
2024å¹´7æ8æ¥ã«éå¬ããããã¸ã§ã¼ã·ã¹ãã¼ã¼ã¯ èå¼±æ§ç¥ãï½èå¼±æ§ã®å ¨ä½åã¨ä»ãåãæ¹ï½ãã®ã»ãã·ã§ã³ãSSVC DeepDiveãã®å 容ã§ãã ãããã®é©ç¨é åºã¯ãCVSSã®é«ãèå¼±æ§ãããããã§ã¯å®éã®éç¨ã¯åãã¾ãããSSVCã¯ãæ»æè ç®ç·ãåãå ¥ããèå¼±æ§è©ä¾¡ãã¬ã¼ã ã¯ã¼ã¯ã§ãç±³å½æ¿åºã§ãæ¡ç¨ããã¦ãã¾ããæ¬ã»ãã·ã§ã³ã§ã¯ãSSVCãæ´»ç¨ãããã¨ã§ãã©ã®ããã«èå¼±æ§ç®¡çãæ¹åãããã®ããå¾¹åºè§£èª¬ãã¾ããCVSSã ãã§ã¯ä¸ååãªæ¹ã«å¿ è¦ã®å 容ã§ãã Xã§ã®ã¸ã§ã¼ã·ã¹ãªèª°ãã®ã¤ã¶ããï¼æç²ï¼ã©ã³ãµã ã¦ã§ã¢ã®ãã¥ã¼ã¹ã§é¨ããã¦ããä¸ãXï¼æ§Twitterï¼ã«ã¦ãããªçºè¨ãç®ã«ãã¾ãããä»ååå ããã¦ããã¸ã§ã¼ã·ã¹ã®çããããå æ ãªæ©ã¿ãæ±ãã¦ããã¨æããç´¹ä»ãã¾ãã Xã§ã®ã¸ã§ã¼ã·ã¹ãªèª°ãã®ã¤ã¶ããã¾ã¨ããã¨ããããªå 容ã«ãªãã¨æãã¾ãã ï¼ä¼å ´ã®æ ã·ã¹ã®æ¹ãé ·ãæ¹å¤æ°ï¼ å ¬éããã
CVE_Prioritizerã¨SploitScanã§èãããKEV Catalog/EPSS/CVSS/SSVC æ¦è¦EPSSãKEV Catalogãæç¨ã«ä½¿ãããã¸ã§ã¯ããæè¿åºã¦ãã¾ããã ãããã«ã¤ãã¦å 容ã確èªããã©ã®ããã«ä½¿ããããåæ§ãªSSVCã¨ã©ãéãããè¦ã¦ããã¾ãã CVE_Prioritizer https://github.com/TURROKS/CVE_Prioritizer SploitScan https://github.com/xaitax/SploitScan Exective Summary EPSS, KEVã®ãã¼ã¿ç¹æ§ãèããå¿ è¦ããã EPSSã¯æ©ä¼ã®ã¿ãKEVã¯æ©ä¼ã¨èå¼±æ§ã示ã å½è©²ããã¸ã§ã¯ãã¯ä½¿ãããããCVSSã®ã¿ã§å¤æãã¦ããçµç¹ã¯ãCVE_Prioritizerãã¾ãã¯ä½¿ã£ã¦ã¿ãã®ãè¯ããããããªã å½è©²ããã¸ã§ã¯ã㯠ã·ã¹ãã åº
èå¼±æ§èª¿æ»åã³ ä¹ æ¹ã¶ãã«èå¼±æ§é¢é£ã®èª¿æ»ããããã¨ã«ãªãã¾ãã¦ã ä»åã¯èªåãé¢åãè¦ã¦ããã·ã¹ãã ã使ã£ã¦ããã½ããã«æ®çãã¦ããèå¼±æ§ä¸è¦§ãå¼ã£ãæãã®ãç®çã ãèããåã«ã¢ãããã¼ãããããããããããåºæ¬æéãªã®ã§ãããã¾ãããããããªã±ã¼ã¹ãããã¾ãã NVDãJVNã¨æ ¼éããã®ãæ°å¹´ã¶ãã§ãã®ã§ãåå¼·ãç´ããªãããã£ã¦ããããã¨æãã¾ãã èå¼±æ§æ å ±ã¯åºæ¬å ¨æ°ãã¦ã³ãã¼ãããã¦ããããã®ã§ããããæå ã§ã¢ã¬ã³ã¬ããæ¹éã§èãã¾ãã è±ç·ããããããä»åã®èª¿æ»ã¯ãµã¤ãä¸ã®æ¤ç´¢æ©è½ã§ãã¾ããã¨ã§ããªãã®ï¼ ã¡ãã£ã¨å¾®å¦ã§ãã å®ã¯NVDã¯ãã¼ã¸ã§ã³ã¾ã§æå®ãã¦ããæãã«æ¤ç´¢ã¯ã§ããã®ã§ããããçµæãä¸æ¬ã§ãã¦ã³ãã¼ãããã¨ãããã¨ãæ®å¿µãªããã§ãã¾ããã ï¼JVNã¯ããããã¼ã¸ã§ã³æå®ã®æ¤ç´¢ã¯ããã¦ããã¾ããããï¼ ã¹ãããã·ã§ããããã¾ãåãã¦ããªãã®ã§ãããVendorã¨P
ããã«ã¡ã¯ãäºä¸ã§ãã FutureVulsã¯ãæ¥ã æ´æ°ãããèå¼±æ§æ å ±ãè£è¶³ããããå¹æçãªéç¨ã»ç®¡çããµãã¼ãããããµã¼ãã¹ã§ããã 2022/9/13ãªãªã¼ã¹ã«ã¦éç¨é¨åã§æç¨ãªSSVC(Stakeholder-Specific Vulnerability Categorization)ããµãã¼ããã¾ããã æ¬ç¨¿ã§ã¯ãèå¼±æ§å¯¾å¿ã®ç¾ç¶ããSSVCã®èª¬æãSSVCã®é©ç¨ä¾ã説æãã¾ãã ç®æ¬¡ èå¼±æ§å¯¾å¿ã®ç¾ç¶ åé¡ç¹ ã©ããããããã®ã SSVCã¨ã¯ æ¦è¦ ã©ã®ãããªå©ç¹ãããã®ã SSVCãé©ç¨ãã å¾æ¥ã®å¤æ SSVCã§ã®å¤æ ã¾ã¨ã èå¼±æ§å¯¾å¿ã®ç¾ç¶èå¼±æ§ãæ¤ç¥ããå¾ã«ã©ã®ããã«å¤æ/対å¿ããã®ããã¯æ©ã¿ã©ããã®å¤ãåé¡ã§ãã ä¸è¬çã«ã¯ä»¥ä¸ãèæ ®ãã¦å¯¾å¿ãæ¤è¨ãã¦ãã¾ãã èå¼±æ§èªä½ã®å±éºåº¦ èªã·ã¹ãã ã¸ã®å½±é¿åº¦ 対çé£æ度 æªå¯¾çã§ã®ãªã¹ã¯ ãã®çºãä¸è¨ãå¤æããåºæºãçµç¹ã§
èå¼±æ§æ¤ç¥ãã¼ã«ã§ããVuls OSSçã®ææ°ã®æ§ç¯æé ãã¾ã¨ãããã®ã§ãã ä»ã®ãµã¤ãã§ãé¡ä¼¼ã®æ å ±ã¯è¦ã¤ããã¾ããã IPAï¼æ å ±å¦çæ¨é²æ©æ§ï¼ã®è³æãå¤ãææ°çã®æåãåæ ãã¦ããªã ã°ã°ã£ã¦è¦ã¤ããæ å ±ãå¤ãããã®ã¾ã¾ã ã¨åããªã ãç¾ç¶ã ã£ãã®ã§ãå人çã«èª¿ã¹ã¦æé æ¸ã®å½¢ã§ãã¾ã¨ãã¦ã¿ã¾ããã å 容çã«ã¯å人çã¡ã¢ã§ãããæ§ç¯æé ã¨ãã¦ä½¿ããã¨æãã¾ãï¼â»ä½¿ããªãã¦ããã£ã¨è¦å®ã£ã¦ãã ããï¼ã å 容ã¯ãæ¦è¦ãã¤ã³ã¹ãã¼ã«æé ãåºæ¬çãªä½¿ãæ¹ã使ç¨ãã¦ã¿ã¦ã®ææ³ãã§ãã æ£ç´ããã¼ã«ã§ã®æ¤ç¥ã»ç®¡çã¯éçãããæ°ããã¾ãããä¸å¿ã¯èª¿ã¹ãã®ã§è¨ãã¦ããã¾ãã ãªãèå¼±æ§æ¤ç¥ãã¼ã«ï¼ 社å ã«ãµã¼ãã¼ãè¤æ°ï¼ã¨ãããããããï¼ããã¨ãã©ã®ãµã¼ãã¼ã®ä½ã®ã½ããã¦ã§ã¢ã«ã©ããªèå¼±æ§ãããã®ããæåã§ç®¡çããã®ã¯å¤§å¤ãªã®ã§ããã¼ã«ã§èªååã§ãããéç¨è² è·ã軽æ¸ã§ãããã§ãã æåãNVD[1]ã
èå¼±æ§æ å ± (CVE : Common Vulnerabilities and Exposures) ã®å¯¾å¿ç¶æ³ã確èªããæé ãã¾ã¨ãã¦ãããã¨æãï¼ CVE ãã¼ã¿ãã¼ã¹ CVE æ å ±ã¯å ¨ã¦ä»¥ä¸ã«ã¾ã¨ã¾ã£ã¦ããï¼ cve.mitre.org å ¨ã¦ã® CVE ã«ã¯ã¦ãã¼ã¯ãª ID ãæ¯ããã¦ãã¦ï¼ä¾ãã°ï¼ç°å¢å¤æ° HTTP_PROXY ãæªç¨ãã¦å¤é¨ãµã¤ãã¨éä¿¡ã§ãã¦ãã¾ãå¯è½æ§ããã "httpoxy" ãªã CVE-2016-5385 ã ãï¼ImageMagick ã§ä»»æã®ã¹ã¯ãªãããå®è¡ããã¦ãã¾ãå¯è½æ§ããã "ImageTragick" ãªã CVE-2016-3714 ã¨ãªãï¼"Shellshock" ãããã ãã©ï¼ã©ã®èå¼±æ§ãã«ãã³ã¤ã¤å¥åï¼å¨ãï¼ãä»ãã¦ã¦ï¼ã¨ã³ã¸ãã¢å士ã®ä¼è©±ã ã¨ããºã¯ã¼ãçã«èªèã§ãã¦è¯ãã¨æãï¼ CVE - CVE-2016-5385 CVE - CV
vFeedã®èª¿æ»ãã®1ã®ç¶ãã§ãã AdventCalendarããªãã³ã§æ®æ®µèª¿æ»ãã¦ãã¦ãã§ãã¦ããªãã£ããã¨ã調ã¹ã¦ã¡ã¢ã£ã¦ããã·ãªã¼ãºã 2017å¹´12ææç¹ã§ã®Vulsã¯ãã¤ã³ã¿ã¼ãããä¸ã«å ¬éããã¦ããNVD, JVN, OVALã®èå¼±æ§ãã¼ã¿ãã¼ã¹ãå©ç¨ãã¦ããããããã®èå¼±æ§ãã¼ã¿ãã¼ã¹ã¯ã対å¿ãã¦ããã¢ããªã±ã¼ã·ã§ã³ãªã©ã®ç¨®é¡ãå¤ããã°å¤ãã»ã©ãèå¼±æ§æ å ±ã®æ²è¼ãæ©ããã°æ©ãã»ã©Vulsã«ã¨ã£ã¦ã¯æçã§ãããå ·ä½çã«ã¯ æ¤ç¥ç²¾åº¦ãåä¸(CPENameã使ã£ãèå¼±æ§æ å ±ã®æ¤ç´¢æ)ãã ã¬ãã¼ãã«è¡¨ç¤ºããæ å ±ããªããã«ãªã ã¨ããå©ç¹ãããã ä»åã¯vFeedã¨ããèå¼±æ§ãã¼ã¿ãã¼ã¹ãããã¨ããæ å ±ãå ¥æããã®ã§ãvFeedã«ã¤ãã¦èª¿ã¹ãçµæãã¡ã¢ä»£ããã«æ¸ãã¦ããã get_certvn : retrieve information related to advisories
tl;dr Vuls -> S3 -> Lambda -> EC2ã«æ·±å»åº¦ãã¿ã°ä»ããã¦ã¿ãã ä»ã«ãå¼·å¶çã«ãããå½ã¦ãã¨ãã»ãã¥ãªãã£ã°ã«ã¼ãå¤æ´ãã¦éé¢ããã¨ãConfig Rulesã¨é£æºããã¨ãè²ã ã§ãããã ãã ã¯ããã« æ¥ã çºè¦ãããèå¼±æ§ã®æ ¹æ¬å¯¾çã¯ãã½ããã¦ã§ã¢ã¢ãããã¼ãã§ãã1æ¥ã«ç¾ä¸ç¨®é¡ã®ãã«ã¦ã§ã¢ãä½æãããã¦ãç¾å¨ãã·ã°ããã£ãã¼ã¹ã®ã¢ã³ãã¦ã£ã«ã¹ãIDS, IPSãå ¥ãã¦ãããã大ä¸å¤«ãã¨ã¯è¨ãåãã¾ãããããã±ã¼ã¸ããã¼ã¸ã£ã®èªåã¢ãããã¼ãé©ç¨ãå¯è½ã§ããã°æ¥½ãªã®ã§ãããã¢ãããã¼ããåå ã§ãµã¼ãã¹åæ¢ãããªã¹ã¯ãæãã¦æåã¢ãããã¼ãã§éç¨ããã±ã¼ã¹ãå¤ãè¦åãããã¾ããæåã¢ãããã¼ãã§ã®éç¨ã¯é常ã«éç¨ã³ã¹ãããããã¾ããéç¨è ã¯JVNãNVDãªã©ã§æ¥ã æ å ±åéããã¦ãæ¥ã çºè¦ãããèå¼±æ§ãèªåã®ç®¡çããã©ã®ãµã¼ãã«è©²å½ããã®ããå¤æããªããã°ãªãã¾
ã³ã³ããã¤ã¡ã¼ã¸ã®ã¬ã¸ã¹ããªã§ã¯ãèå¼±æ§æ¤æ»ã®å®è£ ãå½ããåã«ãªã£ã¦ãããä¼æ¥ã§Kubernetesãªã©ã³ã³ããã使ç¨ããã«ããã£ã¦èå¼±æ§å¯¾çãã©ãã»ã©éè¦ãªãã®ãç解ããããã«ãèå¼±æ§æ¤æ»ããé¢é£ããå½éçãªæ¨æºã«ã¤ãã¦æ´çããã èå¼±æ§ï¼ãããããããï¼ã¨ã¯ èå¼±æ§ã¨ã¯ãããã°ã©ã ã®åä½ã®ä¸åãæªç¨ãããæ å ±ã»ãã¥ãªãã£ä¸ã®å¼±ç¹ã§ãããã¤ã¾ããã½ããã¦ã§ã¢ä¸ã®åé¡ãåå ã¨ãªã£ã¦çããæ¬ é¥ã§ãããã»ãã¥ãªãã£ãã¼ã«ã¨ãå¼ã°ãããå½ç¶ãã½ããã¦ã§ã¢éçºè ã¯ãèå¼±æ§ãç£ã¾ãªãããã«ç´°å¿ã®æ³¨æãæã£ã¦ã³ã¼ãéçºãé²ããããéçºè ãå©ç¨ãããªãã¬ã¼ãã£ã³ã°ã·ã¹ãã ã®ã©ã¤ãã©ãªãããã±ã¼ã¸ã«å«ã¾ãããã¨ãããããã®ãããªäºæ ãããéçºè ã®è²¬ä»»ç¯å²å¤ã«åå ãããå ´åãå¤ãããã æ½å¨çãªèå¼±æ§ãçªããæ°ããªã¯ã©ããã³ã°ã®æå£ããæéã®çµéã¨ãã«çºè¦ãããããã®ãã¨ãããéçºå½åã¯ã³ã¼ãã«èå¼±æ§ã¯ç¡ã
ååãVulsã®ã³ã¼ããèªã ãã®ï¼ å ¨ä½åã®ææ¡ã§ãã£ããã¨scanã³ãã³ãå¨ãã®ãã¼ãã³ã¼ãã¨å®è¡æã®æµãã®ç解ãè¡ãã¾ããã ä»åã¯ãVulsã®ä¸ã§å©ç¨ããã¦ãã go-cve-dictionary ã«ã¤ãã¦ã½ã¼ã¹ã³ã¼ããèªãã§ãç解ããã¦ããããã¨æãã¾ãã ã¾ããä»åã¯ã½ã¼ã¹ã³ã¼ãã確èªãã¦ããä¸ã§ãã°ãçºè¦ããã«ãªã¯ãåºãã¦ã¿ã¾ããã®ã§ãã«ãªã¯ã®æãæ¹ã«ã¤ãã¦ãç°¡åã«è§£èª¬ãã¦ããããã¨æãã¾ãã (è¿½è¨ 2019/11/23) ç¡äºãã«ãªã¯ããã¼ã¸ããã¾ããï¼ go-cve-dictionaryã®ç¹å¾´ ã½ã¼ã¹ã³ã¼ã main.go commands/ commands/fetchnvd.go 1. ãã¼ã¿ãã¼ã¹æ¥ç¶ 2. metaæ å ±ã®åå¾ 3. metaæ å ±ããæ´æ°ãå¿ è¦ãã©ããå¤æ (éå»ã®metaæ å ±ã¨æ¯è¼) 4. NVDã®èå¼±æ§æ å ±ã®åéãå¤æ 5. èå¼±æ§æ å ±ããã¼ã¿
Deleted articles cannot be recovered. Draft of this article would be also deleted. Are you sure you want to delete this article? ã¯ããã« Vulsãã©ããã£ã¦ã¤ã³ã¹ãã¼ã«ãããããã±ã¼ã¸ã¨ãã®ãã¼ã¸ã§ã³ã«å¯¾å¿ããCVEãè¦ã¤ãåºãã®ãçåã«æãã¾ããã GolangãVulsãä½ãåãããªãã®ã§ééã£ã¦ããçªã£è¾¼ãã§ãã ãã é¢æ°å¼ã³åºããªã¹ãï¼ï¼ ããããã¨ãã©ãããå³ã«ããã°è¯ããããããªãã§ãã⦠ãã¼ã«ã«ã®CentOSãDeep Scanããå ´åãä»®å®ãã¦ãã¾ãã主è¦ãªãã®ã ãæãåºãã¦ã¾ãã ()ã¯æ·±ãï¼ã¿ãããªãã®ã®ã¤ããã§ã (0) commands/scan.go Execute vuls scanãããã¨ãå¼ã³åºããã (1) scan/ser
ãã¡ãã®å 容ã¯ã»ã»ã» ã»ä¸å¸ããã»ãã¥ãªãã£èå¼±æ§ã®éç¨ãå 製åãããããéã¯ãããããªãã¨è¨ãã ã»ã¨ã¼ã¸ã§ã³ãã¬ã¹ã ããè¡ããã¨æã£ãããä¸å¸ããsshæ¥ç¶ãããªãã¦ããããªãã¨è¨ãã ã»éç¨æ å½ãããVulsã®ããã©ã«ãã®éç¥æ¹æ³ã§ã¯ãããããªãã¨é§ã ããããã¦ãã¾ã£ã ã»ã»ã»ãããªäººåã ã§ããã㨠ã»Vuls Serverãç¨ããã»ãã¥ãªãã£èå¼±æ§éç¥ã®ç°å¢ãæ§ç¯ ã»ï¼æ¥ï¼åãCVEæ å ±ï¼cvss3ï¼ã®æ´æ°ã¨Vuls Reportéç¥ãè¡ã ã»åæ¥ã®Reportã®çµæã«å·®åãããå ´åã®ã¿ã¡ã¼ã«éç¥ï¼ããã¯ãã°ã«éç¥ãã ã»Target Serverã«ããç¹å®ã®ããã±ã¼ã¸æ å ±ï¼kernelãhttpdçï¼ã ããéç¥ãã ç°å¢ ã»AWSä¸ã«æ§ç¯ããCentosï¼ ã»Vuls 0.5.0 æ§æ ã»ãã£ããã¨ãããªæ§æã§ä½ã£ã ä½æ¥å 容 1.CentoOS7ãµã¼ãã¼ç¨æ 2.go-cve
æ¦è¦ èªå® ãµã¼ãã®ã»ãã¥ãªãã£ãã§ãã¯ããã¦è¦ãã èå¼±æ§è¨ºæãã¼ã« nikto niktoã¯ãWeb ã¢ããªã±ã¼ã·ã§ã³ã»ãã¥ãªãã£ã¹ãã£ãã¼ã $ sudo apt install nikto -y $ nikto -h localhost - Nikto v2.1.5 --------------------------------------------------------------------------- + Target IP: 127.0.0.1 + Target Hostname: localhost + Target Port: 80 + Start Time: 2019-08-23 22:26:00 (GMT9) ---------------------------------------------------------------------------
ãã®ãã¼ã¸ã¯ãæè¡æ¸å ¸4ã«ã¦é å¸ããBOOTHã«ã¦è²©å£²ãã¦ããå人èªã®ä¸é¨æç²ã§ãã ç§ã®ç¾å ´ã§ã®ç¥è¦ããã¼ã¹ã¨ãªã£ã¦ãããå 容ã«é¢ãã¦åã£ã¦ããé¨åããä¸è¬çã§ã¯ãªãé¨åçãå¤ãã¨æãã¾ãã®ã§ãå 容ãæ£ãããªãã¨æããå ´åã¯ããã²ã³ã¡ã³ãæ¬ã§ã³ã¡ã³ããããã ãã¾ãã¨å¹¸ãã§ãã 第1ç« ãã¯ããã« 1-1 æ¬æ¸å·çã®çç±ã¨ãµã¤ãã¼æ»æãåããå®ä½é¨ ã¯ããã¾ãã¦ãèè ã®å è¤æ³°æã§ãã æ±äº¬é½å ã®ITä¼æ¥ã«ã¦ãSaaSã®ããã¯ã¨ã³ããæ¯ããã¤ã³ãã©ã¨ã³ã¸ãã¢ã¨ãã¦åããªããã趣å³ã§ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ãå人éçºãã¦ãã¾ãã å 輩ã¨ã³ã¸ãã¢ãµã¼ã Ruby on Railsã¢ã㪠ãã®å人èªã®å·çãé²ãã¦ããã¨ãã2018å¹´2æ1æ¥ã«ãªãªã¼ã¹ãããæãéãµã¼ãã¹ãOsushiãããè³é決æ¸æ³ã®åé¡ãããµã¼ãã¹ã®èå¼±æ§ï¼äºé決æ¸ããããä»ã®ã¦ã¼ã¶ã¼ã¨åãã¦ã¼ã¶ã¼IDãè¨å®ããã¨ãã®ã¦ã¼ã¶ã¼ã®ãã
ã¯ããã« AdventCalendarããªãã³ã§æ®æ®µèª¿æ»ãã¦ãã¦ãã§ãã¦ããªãã£ããã¨ã調ã¹ã¦ã¡ã¢ã£ã¦ããã·ãªã¼ãºã 2017å¹´12ææç¹ã§ã®Vulsã¯ãã¤ã³ã¿ã¼ãããä¸ã«å ¬éããã¦ããNVD, JVN, OVALã®èå¼±æ§ãã¼ã¿ãã¼ã¹ãå©ç¨ãã¦ããããããã®èå¼±æ§ãã¼ã¿ãã¼ã¹ã¯ã対å¿ãã¦ããã¢ããªã±ã¼ã·ã§ã³ãªã©ã®ç¨®é¡ãå¤ããã°å¤ãã»ã©ãèå¼±æ§æ å ±ã®æ²è¼ãæ©ããã°æ©ãã»ã©Vulsã«ã¨ã£ã¦ã¯æçã§ãããå ·ä½çã«ã¯ æ¤ç¥ç²¾åº¦ãåä¸(CPENameã使ã£ãèå¼±æ§æ å ±ã®æ¤ç´¢æ)ãã ã¬ãã¼ãã«è¡¨ç¤ºããæ å ±ããªããã«ãªã ã¨ããå©ç¹ãããã ä»åã¯vFeedã¨ããèå¼±æ§ãã¼ã¿ãã¼ã¹ãããã¨ããæ å ±ãå ¥æããã®ã§ãvFeedã«ã¤ãã¦èª¿ã¹ãçµæãã¡ã¢ä»£ããã«æ¸ãã¦ããã vFeedã¨ã¯ï¼ vFeedIO https://vfeed.io/about/ å種èå¼±æ§ãã¼ã¿ãã¼ã¹ã®éç´ããèå¼±æ§DBã éåç¨ã
For a system administrator, having to perform security vulnerability analysis and software update on a daily basis can be a burden. To avoid downtime in a production environment, it is common for a system administrator to choose not to use the automatic update option provided by the package manager and to perform update manually. This leads to the following problems. The system administrator will
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}