CodeZineç·¨éé¨ã§ã¯ãç¾å ´ã§æ´»èºãããããããã¼ãã¹ã¿ã¼ã«ããããã®ã«ã³ãã¡ã¬ã³ã¹ãDevelopers Summitãããã¨ã³ã¸ãã¢ã®çããã¾ããã¼ã¹ãããããã®ã¤ãã³ããDevelopers Boostããªã©ããã¾ãã¾ãªã«ã³ãã¡ã¬ã³ã¹ãä¼ç»ã»éå¶ãã¦ãã¾ãã
輸åºã°ã¬ã¼ãã®RSAæå·ããµãã¼ããã¦ãããã¨ã«èµ·å ããèå¼±æ§FREAKã«é¢ããæ å ±ã«ã¤ãã¦é¢é£æ å ±ãã¾ã¨ãã¾ãã èå¼±æ§æ¦è¦ èå¼±æ§ã®æ¦è¦æ å ±ã¯æ¬¡ã®éãã æç§° FREAK (Factoring attack on RSA-EXPORT Keysã®ç¥) 輸åºã°ã¬ã¼ãæå·ã®å¼·å¶ä½¿ç¨ã«é¢ããå¼ç§° ã¢ã¤ã³ã³ ç¡ã CVE OpenSSLï¼CVE-2015-0204 Appleï¼CVE-2015-1067 Microsoftï¼CVE-2015-1637 çºè¦è å miTLS Inria(ãã©ã³ã¹å½ç«æ å ±å¦èªåå¶å¾¡ç ç©¶æ)ã¨Microsoft Researchã®ååãã¼ã FREAK Attackã®æ¦è¦ ä¸éè æ»æãè¡ãããã¾ã§ã®FREAK Attackã®æµãã¯æ¬¡ã®éãã(3æ6æ¥æ´æ°) MITMã®æ»ææç«æ¡ä»¶ 以ä¸ã®æ¡ä»¶ãæç«ããå ´åãéä¿¡å 容ã®çè´ãæ¹ããã®å½±é¿ãåããå¯è½æ§ãããã æ¥ç¶å ã»
ç¡å¹ãªURLã§ãã ããã°ã©ã è¨å®ã®åæ å¾ ã¡ã§ããå¯è½æ§ãããã¾ãã ãã°ããæéãããã¦å度ã¢ã¯ã»ã¹ãã試ããã ããã
This article was originally published on the Red Hat Customer Portal. The information may no longer be current. Update 2014-09-30 19:30 UTC Questions have arisen around whether Red Hat products are vulnerable to CVE-2014-6277 and CVE-2014-6278. We have determined that RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312 successfully mitigate the vulnerability and no additional actions need to be ta
å 鱿«ããããããã²ãã¯ã©ã¹ã¿ã§ãä½ãèµ·ãã¦ããããããã¨ããã¦ããCCCï¼ã«ã«ãã£ã¼ã³ã³ããã¨ã³ã¹ã¯ã©ãï¼æ¹é¢ã§ãä¸å¯è§£ãªãã¬ã¹ãªãªã¼ã¹ãçºè¡¨ããã¦ç©è°ã¨ãªã£ã¦ãã¾ããããã¯ä½ãªãã§ãããï¼ ã客ãã¾æ å ±ã®ãåãæ±ãã«ã¤ã㦠http://www.ccc.co.jp/news/2014/20140723_004544.html http://www.peeep.us/7e70ec75 [å¼ç¨] ãã®ãããã客ãã¾ã®ãååãã使ãªã©å人ãç¹å®ã§ããæ å ±ããä¸è¬ä¼æ¥ã¯ãã¡ããã®ãã¨ãTãã¤ã³ãã¢ã©ã¤ã¢ã³ã¹ä¼æ¥ã¸ãç´æ¥ãæä¾ãããã¨ã¯ä¸åããã¾ããã -- ï¼ ãã®ãããã客ãã¾ã®ãååãã使ãªã©å人ãç¹å®ã§ããæ å ±ã ï¼ ãã®ãããã客ãã¾ã®ãååãã使ãªã©å人ãç¹å®ã§ããæ å ±ã ï¼ ãã®ãããã客ãã¾ã®ãååãã使ãªã©å人ãç¹å®ã§ããæ å ±ã [å¼ç¨] Q ãåºã§Tã«ã¼ããæç¤ºãã¦ã
JPCERT/CCã¯2011å¹´11æ17æ¥ãDNSãµã¼ãã¼ã½ããã¨ãã¦ä¸çä¸ã§æã使ããã¦ãããISC BIND 9ãã«DoSï¼Denial of Serviceããµã¼ãã¹å¦¨å®³ï¼æ»æãåããé大ãªèå¼±æ§ãè¦ä»ãã£ãã¨ãã¦æ³¨æãå¼ã³ããããBINDéçºå ã®ISCï¼Internet Systems Consortiumï¼ã«ããã°ãæ¢ã«è¤æ°ã®ã¤ã³ã¿ã¼ãããçµç¹ããDNSãµã¼ãã¼ãã¯ã©ãã·ã¥ããã¨ããå ±åãåãã¦ããã¨ããã å½±é¿ãåããã®ã¯ãç¾å¨ãµãã¼ããæä¾ããã¦ãããã¹ã¦ã®ãã¼ã¸ã§ã³ã®BIND 9ï¼9.4-ESVã9.6-ESVã9.7.xã9.8.xï¼ããããã使ã£ã¦ããDNSãµã¼ãã¼ï¼DNSãã£ãã·ã¥ãµã¼ãã¼ï¼ã«å¯¾ãã¦ãæªæã®ãã第ä¸è ããï¼1ï¼é éããç´°å·¥ããDNSãã±ãããéãä»ãããã¨ã§ä¸æ£ãªã¬ã³ã¼ãããã£ãã·ã¥ããããï¼2ï¼ãã£ãã·ã¥ãµã¼ãã¼ã«å¯¾ãã¦ãã®ã¬ã³ã¼ããåãåããã--
iPhone 4Sã«ãã¹ã³ã¼ãããã¯ãããã£ã¦ãã¦ããä»äººããã¿ã³ãæ¼ãã¦Siriã«è©±ããããã¨æä½ã§ãã¦ãã¾ãã¨ããã âã»ã³ã¹âã®ããåãçãã§è©±é¡ã«ãªã£ã¦ããiPhone 4Sã®é³å£°æä½æ©è½ãSiriããããã¹ã³ã¼ãããã¯ããããããç¶æ ã§ã話ããããããã¨åå¿ãã¦ãã¾ããã¨ãããã¨ãããã»ãã¥ãªãã£ä¼æ¥ã®è±Sophosã10æ19æ¥ã®ããã°ã§ä¼ããã ã»ãã¥ãªãã£å°éå®¶ãªã©ã¯ãiPhoneãç¡æã§ä½¿ãããã®ãé²ãããã使ã£ã¦ããªãæã¯ãã¹ã³ã¼ããªã©ã®ããã¯ãããããã¨ã奨å±ãã¦ãããã¨ãããiPhone 4Sã¯ããã¹ã³ã¼ãããã¯ãããã£ã¦ãã¦ããä»äººããã¿ã³ãæ¼ãã¦Siriã«è©±ããããã¨æä½ã§ãã¦ãã¾ãã¨ããã Sophosã®ã°ã©ãã ã»ã¯ã«ã¼ãªã¼æ°ã¯ãååã«æ¿è«¾ãå¾ã¦ãã®ååã®iPhone 4Sãåãããã¹ã³ã¼ãããã¯ãããã£ãç¶æ ã§ãé»åã¡ã¼ã«ãæ¸ãããããã¹ãã¡ãã»ã¼ã¸ãéä¿¡ã
åä½ JPCERT-AT-2011-0023 JPCERT/CC 2011-08-31(åç) 2011-09-15(æ´æ°) <<< JPCERT/CC Alert 2011-08-31 >> Apache HTTP Server ã®ãµã¼ãã¹éç¨å¦¨å®³ã®èå¼±æ§ã«é¢ããæ³¨æåèµ· Apache HTTP Server DoS Vulnerability https://www.jpcert.or.jp/at/2011/at110023.txt I. æ¦è¦ Apache HTTP Server ã«ã¯ããµã¼ãã¹éç¨å¦¨å®³ (DoS) ã®èå¼±æ§ãããã¾ãã é éã®ç¬¬ä¸è ãç´°å·¥ãã HTTP ãªã¯ã¨ã¹ãã Apache HTTP Server ã«éãã㨠ã§ã·ã¹ãã ãªã½ã¼ã¹ã大éã«ä½¿ç¨ãããçµæã¨ãã¦ãµã¼ãã¹ä¸è½ç¶æ ã«é¥ãå¯ è½æ§ãããã¾ãã Range header DoS vulnerability
Apacheã®èå¼±æ§(CVE-2011-3192)ããããApache killerã話é¡ã«ãªã£ã¦ãã¾ããããã®è å¨ã«ã¤ãã¦ã¯ä¸é¨èª¤è§£ãããããã§ãã 以ä¸ã¯ãé常ã«è å¨ã¨ããå ±åã®ä¾ã§ãã 䏿¹ä»åã®ã¯ããã»ã¹ã®è¥å¤§åãä¼´ãã®ã§ãå®ã¡ã¢ãªæ¶è²»ãã¦æ´ã«ã¹ã¯ããã使ãå°½ããã¦OSæ¯æ¿éã«ãªã£ããããLinuxã¨ãã®å ´åã¯OOM Killerçºåã¨ãä»ã®ããã»ã¹ãå ´åã«ãã£ã¦ã¯OSãå·»ãè¾¼ãã§éã£ã¦ãã¾ãã¾ãã CVE-2011-3192 Range header DoS vulnerability Apache HTTPD 1.3/2.xããå¼ç¨ 以ä¸ã¯ãããã»ã©è å¨ã§ãªãã£ãã¨ããå ±åã®ä¾ã§ãã pooh.gr.jp ã¯çµæ§é ä¸ã ã£ãã®ã§ 60 並åã§ãã£ã¨ CPU idle 30% ã¾ã§æ¸ãããã Apache Killer (CVE-2011-3192) 対ç for CentOS 5
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}