The best of CES 2025Presenting our 12 finalists, plus the winner of our best in show award.
æªç¨ãããå ´åãæ»æè ãã²ã¹ãä»®æ³ãã·ã³ï¼VMï¼ããæãåºãã¦ãã¹ãã·ã¹ãã ã«ã¢ã¯ã»ã¹ããä»»æã®ã³ã¼ããå®è¡ã§ãã¦ãã¾ãæããããããã¹ãã·ã¹ãã ã®ä»ã«ããã®ãã¹ãä¸ã§å®è¡ããã¦ããä»ã®å ¨ã¦ã®VMã«ã¢ã¯ã»ã¹ã§ãã¦ãã¾ãå¯è½æ§ãããã¨ããã ãã®èå¼±æ§ã¯å¹ åºãä»®æ³ãã©ãããã©ã¼ã ã«å½±é¿ãåã³ãããã©ã«ãã®è¨å®ã«å¯¾ãã¦æ»æãéç¨ããä»»æã®ã³ã¼ããå®è¡ãããæããããã¨ããç¹ã§ãéå»ã«è¦ã¤ãã£ãä»ã®VMã¨ã¹ã±ã¼ãã®èå¼±æ§ã¨ã¯ç°ãªãã¨CrowdStrikeã¯ææãæªç¨ãããã°ä¼æ¥ãªã©ã®ç¥ç財ç£ãå人æ å ±ã¨ãã£ãæ å ±ã®æµåºã«ã¤ãªãããããªãã¨è¦åãã¦ããã èå¼±æ§ã¯ãã¤ãã¼ãã¤ã¶ã¼ã®ã³ã¼ããã¼ã¹ã«åå¨ãããã¨ããããã¹ãOSï¼LinuxãWindowsãMac OSï¼ã«é¢ä¿ãªãå½±é¿ãåãããã¾ããã²ã¹ãOSã«ãå·¦å³ãããªãã å½±é¿ãåãããã¨ã確èªããã¦ãããã³ãã¼ã¯QEMUãXen Project
2015å¹´1æ27æ¥(ç¾å°æé) Qualysã¯glibc(GNU C Library)ã«èå¼±æ§ãçºè¦ããæ å ±ãå ¬éãã¾ãããããã§ã¯é¢é£æ å ±ãã¾ã¨ãã¾ãã(æ«å®ã¾ã¨ããªã®ã§ç²¾åº¦ä½ããç¶²ç¾ æ§ç¡ãã§ããã) (1) èå¼±æ§é¢é£æ å ± Qualysãå ¬éããèå¼±æ§æ å ± The GHOST Vulnerability Qualys Security Advisory CVE-2015-0235 注æåèµ· IPA (注æ) libc ã®èå¼±æ§å¯¾çã«ã¤ãã¦(CVE-2015-0235) èå¼±æ§ã®æ¦è¦ glibcã®__nss_hostname_digits_dots() ã«ãã¼ããããã¡ãªã¼ãã¼ããã¼ã®èå¼±æ§ã å½è©²é¢æ°ã¯glibcã®gethostbyname()ã¨gethostbyname2()ããå¼ã°ãã¦ããã ã¢ããªã±ã¼ã·ã§ã³ã«ãã£ã¦ã¯ãDoSãã¾ãã¯ãªã¢ã¼ãããä»»æã®ã³ã¼ããå®è¡å¯è½ã¨ãªãå¯è½æ§
Steven J. Vaughan-Nichols ï¼Special to ZDNET.comï¼Â ç¿»è¨³æ ¡æ£ï¼Â ç·¨éé¨ 2015-01-28 10:04 ã¯ã©ã¦ãã»ãã¥ãªãã£ä¼æ¥Qualysã®ç 究è ããLinux GNU Cã©ã¤ãã©ãªï¼glibcï¼ã«æ·±å»ãªã»ãã¥ãªãã£ãã¼ã«ã§ãããGHOSTãï¼CVE-2015-0235ï¼ãçºè¦ããããã®èå¼±æ§ãå©ç¨ããã¨ãããã«ã¼ã¯IDããã¹ã¯ã¼ããç¥ããªãã¦ãã·ã¹ãã ããªã¢ã¼ãããä¹ã£åããã¨ãã§ããã Qualysã¯ãã ã¡ã«ãã®ã»ãã¥ãªãã£ãã¼ã«ã«ã¤ãã¦ä¸»ãªLinuxã®é å¸å ã«è¦åãéããå¤ãã®é å¸å ããã§ã«ããããå ¬éãã¦ããã ãã®ã»ãã¥ãªãã£ãã¼ã«ã¯ãglibc-2.2ï¼2000å¹´11æ10æ¥ã«ãªãªã¼ã¹ï¼ã使ç¨ãã¦ãã«ãããããã¹ã¦ã®Linuxã·ã¹ãã ã«åå¨ãããQualysã«ããã°ããã®ãã°ã¯å®éã«ã¯ã2013å¹´5æ21æ¥ã«ãªãªã¼ã¹ããããgl
bashã«èå¼±æ§ã確èªãããã¨ãã¦é¨ãã«ãªã£ã¦ãã¾ããããã§ã¯CVE-2014-6271ã«é¢ããæ å ±ãã¾ã¨ãã¾ãã #è¨è¼å 容ã«ã¤ãã¦ã誤ã£ã¦ããã追è¨ããæ¹ãããçæ å ±ããããã¾ããã@piyokangoã¾ã§ãé£çµ¡ãé¡ããã¾ãã èå¼±æ§æ å ± èå¼±æ§ã®æ称 ShellShock Bashbug CVEçªå· Bashå¨ãã§çºè¡ããã¦ããCVEã¯6ã¤ããã®å 詳細ãä¸æãªã®ã2ã¤ã(CVE-2014-6277,CVE-2014-6278) CVE çºè¦è æ³å®è å¨ ç¹è¨ CVE-2014-6271 Stephane Chazelasæ° ä»»æã®ã³ã¼ãå®è¡ ShellShockã®çºç«¯ã¨ãªã£ããã°ã CVE-2014-7169 Tavis Ormandyæ° ä»»æã®ã³ã¼ãå®è¡ CVE-2014-6271ä¿®æ£æ¼ãã«ããèå¼±æ§ CVE-2014-7186 Redhat DoS ã¡ã¢ãªç ´å£(Out-of-Bo
OpenSSLã®èå¼±æ§ãHeartbleedãã«ç¶ãã人æ°ã®ãªã¼ãã³ã½ã¼ã¹ã»ãã¥ãªãã£ã½ããã¦ã§ã¢ã§ã¾ã1ã¤å¤§ããªèå¼±æ§ãè¦ã¤ãã£ããä»åãèå¼±æ§ãè¦ã¤ãã£ãã®ã¯ãã°ã¤ã³ãã¼ã«ã®ãOAuthãã¨ãOpenIDãã§ããããã®ãã¼ã«ã¯å¤æ°ã®ã¦ã§ããµã¤ãã¨ãGoogleãFacebookãMicrosoftãLinkedInã¨ãã£ããã¯ããã¸å¤§æã«ä½¿ããã¦ããã ã·ã³ã¬ãã¼ã«ã«ããNanyang Technological Universityï¼åæ´ç工大å¦ï¼ã§å¦ã¶å士課ç¨ã®å¦çWang Jingæ°ã¯ããCovert Redirectãã¨ããæ·±å»ãªèå¼±æ§ã«ãã£ã¦ãå½±é¿ãåãããµã¤ãã®ãã¡ã¤ã³ä¸ã§ãã°ã¤ã³ç¨ãããã¢ããç»é¢ãå½è£ ã§ãããã¨ãçºè¦ãããCovert Redirectã¯ãæ¢ç¥ã®ã¨ã¯ã¹ããã¤ããã©ã¡ã¼ã¿ã«åºã¥ãã¦ããã ãã¨ãã°ãæªæãããã£ãã·ã³ã°ãªã³ã¯ãã¯ãªãã¯ããã¨ãFaceboo
æ¬æ¥ãJPRSãç·æ¥ã®æ³¨æåèµ·ãå ¬è¡¨ãã¾ããã ç·æ¥ï¼ãã£ãã·ã¥ãã¤ãºãã³ã°æ»æã®å±éºæ§å¢å ã«ä¼´ãDNSãµã¼ãã¼ã®è¨å®å確èªã«ã¤ãã¦ï¼2014å¹´4æ15æ¥å ¬éï¼- åãåããUDPãã¼ãã®ã©ã³ãã åã®éãããªç¢ºèªã»å¯¾å¿ãå¼·ãæ¨å¥¨ ããã«å¯¾ãã¦ã2æä¸æ¬ã«èå¼±æ§ãçºè¦ãã¦JPRSã¸ã¨å ±åãã¦ããé´æ¨æ°(èå¼±æ§ã¯åéæ°ã¨ã®å ±åçºè¦)ããJPRSã®æ³¨æåèµ·ã§ã¯ãå±éºæ§ãããç解ãã¦å¯¾çãã¨ãã«ããã£ã¦ååãªæ å ±ãå«ã¾ãã¦ããã¨ã¯ããã¾ãããã¨ãã¦ã以ä¸ã®æ å ±ãå ¬éãã¦ãã¾ãã éãããã³ãã©ã®ç®± - é·å¹´æ¾ç½®ããã¦ããDNSã®æãã¹ãæ¬ é¥ãæããã« ãã£ãã·ã¥ãã¤ãºãã³ã°ã®éãããã³ãã©ã®ç®± ãã£ãã·ã¥ãã¤ãºãã³ã°ã®éãããã³ãã©ã®ç®± - 2 - æ¬æ¥ã§ããã°ãããä¸ä½ããã®æ£è¦ã®åçãåªå ãããªããã°ãªããªãã¯ããªã®ã«ãä¸ä½å´ãåªå ãããä»æ§ã«ãªã£ã¦ããã®ã§ãå½è£ ããããã¼ã¿ãåªå ããã¦ãã¾ã
Webã¢ããªã±ã¼ã·ã§ã³ã«ããã¦JSONãç¨ãã¦ãã©ã¦ã¶ - ãµã¼ãéã§ãã¼ã¿ã®ããåããè¡ããã¨ã¯ãã¯ãæ®éã®ãã¨ã§ããããã®ã¨ãJSONå ã«ç¬¬ä¸è ã«æ¼ãã¦ã¯å°ãæ©å¯æ å ±ãå«ã¾ããå ´åã¯ãå¿ ã X-Content-Type-Options: nosniff ã¬ã¹ãã³ã¹ããããã¤ããããã«ãã¾ããã(ãããæ©å¯æ å ±ãã©ããã«é¢ããããå ¨ã¦ã®ã³ã³ãã³ãã«ã¤ããã»ãããããé¢é£:X-Content-Type-Options: nosniff ã¤ãããªããã¤ã¯æ»ãã°ããã®ã«! - èã£ã±æ¥è¨)ã ä¾ãã°ãæ©å¯æ å ±ãå«ã以ä¸ã®ãããªJSONé åãè¿ããªã½ã¼ã¹(http://example.jp/target.json)ããã£ãã¨ãã¾ãã [ "secret", "data", "is", "here" ] æ»æè ã¯ç½ ãã¼ã¸ãä½æãã以ä¸ã®ããã«JSONé åãvbscriptã¨ãã¦èªã¿è¾¼ã¿ã¾ãããã¡ã
ãUPnPã«èå¼±æ§ãè¦ã¤ãããå±éºã ãã¨ãããã¥ã¼ã¹ããããããªWebãµã¤ãã«æ²è¼ããã¦ãã¾ãããä¾ã«ãã£ã¦ã¾ãä½è¨ã£ã¦ããããåãããªãé¨åãå¤ãã£ãã®ã§ã調ã¹ããã¨ãæ¸ãã¦ããã¾ãã ç®æ¬¡ 1. æ¦è¦2. æ¥æ¬èªãµã¤ãã®æ å ±æº3. ãlibupnpã®èå¼±æ§ãã¯ãUPnPãã±ããã使ã£ããããã¡ãªã¼ãããã¼ã4. ãWANããæ»æå¯è½ãã¨ãããã¥ã¼ã¹ã®æå³5. ãWANããã®SSDPãªã¯ã¨ã¹ããåãä»ãããã«ã¼ã¿ã¼ã¨ã¯ï¼6. ãlibupnpãã¨ãSSDPãªã¯ã¨ã¹ããåãä»ãã¦ãã¾ãèå¼±æ§ãã®é¢ä¿ã«ã¤ãã¦7. ãWANããã®SSDPãåãåããã¨ãèªä½ã®åé¡8. ä½ããã£ããããã¥ã¼ã¹ã«ãªã£ãï¼9. ï¼æï¼ï¼æ¥ã«ãã£ããã¨10. æ¬å½ã®ãã¥ã¼ã¹ã¯ãRapid7ã®ãã¯ã¤ããã¼ãã¼ãã®å ¬é11. ãã¯ã¤ããã¼ãã¼ã®ä¸èº«12. ãããã©ããã¦èå¼±æ§æ å ±ãåºãã®ã13. çµè«ï¼è¦ã¤ãã£ãã®ã¯ãè
èå¼±æ§ã«å¯¾å¦ããæ´æ°çã®ãlibupnp 1.6.18ããå ¬éãããããããããè¡ã渡ãã¾ã§ã«ã¯æéããããè¦éããUS-CERTã§ã¯ãå¯è½ã§ããã°UPnPãç¡å¹ã«ãããªã©ã®å¯¾çãä¿ãã¦ããã ã«ã¼ã¿ãªã©ã®ãããã¯ã¼ã¯æ©å¨ã«åºã使ããã¦ãããUniversal Plug and Playãï¼UPnPï¼ã«è¤æ°ã®èå¼±æ§ã確èªãããã大æã¡ã¼ã«ã¼å社ã®è£½åãå«ãæ°åä¸å°ãå½±é¿ãåããã¨ãããç±³ã»ãã¥ãªãã£æ©é¢ã®US-CERTã¯ã¡ã¼ã«ã¼ããããããã¼ã«å¯¾ããã¢ãããã¼ããé©ç¨ãã¦èå¼±æ§ãä¿®æ£ããããå¼ã³æãã¦ããã US-CERTã1æ29æ¥ã«å ¬éããã»ãã¥ãªãã£æ å ±ã«ããã°ãUPnPããã¤ã¹ç¨ã®ãªã¼ãã³ã½ã¼ã¹ãã¼ã¿ãã«SDKã§ãããlibupnpãã«ãããã¡ãªã¼ãã¼ããã¼ã®èå¼±æ§ãè¤æ°åå¨ãããããã«ãlibupnpã使ã£ã¦ããããã¤ã¹ã¯WANã¤ã³ã¿ãã§ã¼ã¹çµç±ã§UPnPã¯ã¨ãªã¼ãåãå ¥ãã¦ãã¾
ãç¥ãã
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}