==============================================================

マカフィー サポート通信 - リスク管理ソリューション 2011.06.06
==============================================================

本メールはMcAfee Vulnerability Manager製品のサポートをご購入のお客様
に配信しております。

○-======  今週のマカフィー Vulnerability Manager (目次)  =======-○
1) FSL UPDATE
2) OSパッチアップデート
3) 企業向けサポートコミュニティサイトの開設および Twitter サービスの開始について
4) McAfee Vulnerability Manager Software 旧バージョンソフトウェアv6.7のサポート終了について
5) 「サポート通信」登録方法変更のお知らせ


※) マカフィーからのサービス
○-===================================================-○

-------------------------------------------------------
1) FSL UPDATE
-------------------------------------------------------
マカフィーは以下のVulnerability Manager製品のアップデートを提供しています。
最新更新日: 2011-JUN-03

(SUMMARY)

新しいチェック項目 : 173
改善されたチェック項目 : 32
削除されたチェック項目 : 1

 追加・改善されたシグネチャ項目等の詳細は以下の製品ダウンロード
 ページから「McAfee Foundstone Update」の最新版を入手してください。

 http://www.mcafee.com/japan/licensed2/

新しいチェック項目:

* FID #8610 Microsoft Windows RPC DCOM and RPCSS Buffer Overflow Vulnerability
    Risk: High
  * FID #9402 IBM WebSphere Application Server Java Plugin Privilege Escalation Vulnerability
    Risk: High
  * FID #9407 IBM WebSphere Application Server PropFilePasswordEncoder Unspecified Vulnerability
    Risk: High
  * FID #9431 IBM WebSphere Application Server Web Services Security Unspecified Vulnerability
    Risk: High
  * FID #9437 IBM DB2 ADMIN_SP_C Procedure Arbitrary Code Execution Vulnerability
    Risk: High
  * FID #9652 3Com 3CTftpSvc TFTP Server Long Mode Field Multiple Buffer Overflow Vulnerability
    Risk: High
  * FID #9892 Network Associates WebShield SMTP Malformed Mime Header Security Bypass Vulnerability
    Risk: High
  * FID #9903 University Of Washington IMAP Buffer Overflow Vulnerability
    Risk: High
  * FID #9916 Sendmail SSLV2 Disable Option Not Allowed
    Risk: High
  * FID #9944 SquirrelMail spellchecker plug-in Remote Shell Command Execution Vulnerability
    Risk: High
  * FID #9970 Asterisk Null Pointer Dereference Denial Of Service Vulnerability
    Risk: High
  * FID #9977 lighttpd mod_access.c url.access-deny Security Bypass Vulnerability
    Risk: High
  * FID #10147 IBM DB2 SSL Support Privilege Escalation Vulnerability
    Risk: High
  * FID #10154 Dokuwiki 'doku.php' File Include Vulnerability
    Risk: High
  * FID #10268 IBM DB2 DB2WATCH And DB2FREEZE Security Vulnerability
    Risk: High
  * FID #12025 Horde IMP status.php3 Cross Site Scripting Vulnerability
    Risk: High
  * FID #12097 Quest Software Big Brother Arbitrary File Deletion Remote Code Execution
    Risk: High
  * FID #12141 IBM Lotus Notes File Viewer Multiple Buffer Overflows Remote Code Execution
    Risk: High
  * FID #12147 Google Chrome Command Buffer Overflow Remote Code Execution
    Risk: High
  * FID #12148 Google Chrome Stale Pointer in Floats Rendering Memory Corruption Remote Code Execution
    Risk: High
  * FID #12149 Google Chrome Blobs Handle Remote Code Execution
    Risk: High
  * FID #12166 Apple iOS Default Root Account Password
    Risk: High
  * FID #41668 Red Hat Enterprise Linux RHSA-2011-0845 Update Is Not Installed
    Risk: High
  * FID #41671 Red Hat Enterprise Linux RHSA-2011-0833 Update Is Not Installed
    Risk: High
  * FID #81652 Fedora Linux 15 FEDORA-2011-7371 Update Is Not Installed
    Risk: High
  * FID #81665 Fedora Linux 13 FEDORA-2011-7289 Update Is Not Installed
    Risk: High
  * FID #81669 Fedora Linux 14 FEDORA-2011-7302 Update Is Not Installed
    Risk: High
  * FID #85134 CentOS 5 CESA-2011-0845 Update Is Not Installed
    Risk: High
  * FID #92768 Mandriva Linux 2009.0, 2010.1 MDVSA-2011-103 Update Is Not Installed
    Risk: High
  * FID #8507 Apache Partial HTTP Request Denial of Service Vulnerability
    Risk: Medium
  * FID #8514 Apache Tomcat Example Web Application Cross Site Scripting Vulnerability
    Risk: Medium
  * FID #8810 Mozilla Thunderbird Multiple Vulnerabilities I
    Risk: Medium
  * FID #8811 Mozilla SeaMonkey Multiple Vulnerabilities VIII
    Risk: Medium
  * FID #9332 Microsoft ASP.NET Framework _VIEWSTATE Denial Of Service Vulnerability
    Risk: Medium
  * FID #9341 Microsoft ASP.NET Framework _VIEWSTATE Insecure Crypto Validation Vulnerability
    Risk: Medium
  * FID #9393 IBM WebSphere Application Server Multiple Information Disclosure Vulnerabilities
    Risk: Medium
  * FID #9397 IBM WebSphere Application Server CSIv2 Security Bypass Vulnerability
    Risk: Medium
  * FID #9398 IBM WebSphere Application Server Single Sign On Security Bypass Vulnerability
    Risk: Medium
  * FID #9401 IBM WebSphere Application Server Multiple Information Disclosure Vulnerabilities II
    Risk: Medium
  * FID #9406 IBM WebSphere Application Server JSP Root Password Disclosure Vulnerability
    Risk: Medium
  * FID #9408 IBM WebSphere Application Server HTTP Request Smuggling Vulnerability
    Risk: Medium
  * FID #9411 IBM WebSphere Application Server Wsadmin Information Disclosure Vulnerability
    Risk: Medium
  * FID #9413 IBM WebSphere Application Server HTTP Transport Component Denial Of Service Vulnerability
    Risk: Medium
  * FID #9414 IBM WebSphere Application Server Web Services Security Bypass Vulnerability
    Risk: Medium
  * FID #9425 IBM WebSphere Application Server Single Sign On Security Bypass Vulnerability I
    Risk: Medium
  * FID #9426 IBM WebSphere Application Server Forced Logout Session Hijacking Vulnerability
    Risk: Medium
  * FID #9433 IBM WebSphere Application Server HMAC Authentication Bypass Vulnerability
    Risk: Medium
  * FID #9443 IBM WebSphere Application Server Stax XMLStreamWrite Security Bypass Vulnerability
    Risk: Medium
  * FID #9845 CVSTrac filediff Remote Command Execution Vulnerability
    Risk: Medium
  * FID #9849 Novell eDirectory HTTP Request Denial Of Service Vulnerability
    Risk: Medium
  * FID #9895 Network Associates WebShield SMTP Multiple Vulnerabilities
    Risk: Medium
  * FID #9949 Squid Proxy Cache HTTP Version Number Parsing Denial Of Service Vulnerability
    Risk: Medium
  * FID #9951 lighttpd mod_userdir Information Disclosure Vulnerability
    Risk: Medium
  * FID #9988 lighttpd buffer_urldecode() Source Code Disclosure Vulnerability
    Risk: Medium
  * FID #10011 Thomas Hauck JanaServer Multiple Buffer Overflow Vulnerabilities
    Risk: Medium
  * FID #10150 MyServer Directory Traversal Vulnerability
    Risk: Medium
  * FID #10155 MyServer HTTP Post Denial Of Service Vulnerability
    Risk: Medium
  * FID #10197 FreeBSD SSH Extra Port 722 Listening Vulnerability
    Risk: Medium
  * FID #10205 GoAhead WebServer ASP File Source Code Disclosure Vulnerability
    Risk: Medium
  * FID #10246 Edgewall Trac Ticket Query Module SQL Injection Vulnerability
    Risk: Medium
  * FID #10261 ProFTPD Version Below 1.2.2 Detected
    Risk: Medium
  * FID #10401 IBM DB2 Default User db2admin Unauthorized Access Vulnerability
    Risk: Medium
  * FID #11954 Citrix Metaframe XP login.asp Cross Site Scripting Vulnerability
    Risk: Medium
  * FID #11967 Cisco IOS TCP Connection Establishment Denial Of Service Vulnerability
    Risk: Medium
  * FID #11969 Drupal Ubuntu Drupal Theme Information Disclosure Vulnerability
    Risk: Medium
  * FID #11971 Cisco IOS H.323 Denial Of Service Vulnerability
    Risk: Medium
  * FID #12008 Cisco IOS Session Initiation Protocol Multiple Denial Of Service Vulnerabilities
    Risk: Medium
  * FID #12010 Cisco IOS SIP Registration Denial Of Service Vulnerability
    Risk: Medium
  * FID #12011 Cisco IOS SIP REFER Denial Of Service Vulnerability
    Risk: Medium
  * FID #12026 Name Server Daemon Version Directive Remote Version Disclosure Vulnerability
    Risk: Medium
  * FID #12033 Barracuda Spam Firewall 'ldap_test.cgi' Cross Site Scripting Vulnerability
    Risk: Medium
  * FID #12144 WordPress Daily Maui Photo Widget Plugin Title Parameter Cross Site Scripting Vulnerabilities
    Risk: Medium
  * FID #41667 Red Hat Enterprise Linux RHSA-2011-0837 Update Is Not Installed
    Risk: Medium
  * FID #41669 Red Hat Enterprise Linux RHSA-2011-0843 Update Is Not Installed
    Risk: Medium
  * FID #41670 Red Hat Enterprise Linux RHSA-2011-0838 Update Is Not Installed
    Risk: Medium
  * FID #41672 Red Hat Enterprise Linux RHSA-2011-0841 Update Is Not Installed
    Risk: Medium
  * FID #41674 Red Hat Enterprise Linux RHSA-2011-0839 Update Is Not Installed
    Risk: Medium
  * FID #41675 Red Hat Enterprise Linux RHSA-2011-0842 Update Is Not Installed
    Risk: Medium
  * FID #50253 Ubuntu Linux 10.04, 10.10, 11.04, 8.04 LTS USN-1140-1 Update Is Not Installed
    Risk: Medium
  * FID #50256 Ubuntu Linux 10.04, 10.10, 11.04, 8.04 LTS USN-1139-1 Update Is Not Installed
    Risk: Medium
  * FID #50258 Ubuntu Linux 10.04, 10.10, 11.04, 8.04 LTS USN-1140-2 Update Is Not Installed
    Risk: Medium
  * FID #58137 Debian Linux 5.0, 6.0 DSA-2247-1 Update Is Not Installed
    Risk: Medium
  * FID #85132 CentOS 5 CESA-2011-0838 Update Is Not Installed
    Risk: Medium
  * FID #85135 CentOS 5 CESA-2011-0841 Update Is Not Installed
    Risk: Medium
  * FID #85136 CentOS 5 CESA-2011-0843 Update Is Not Installed
    Risk: Medium
  * FID #94549 SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 ruby-4585 Update Is Not Installed
    Risk: Medium
  * FID #9893 lighttpd File Extension Handling Remote Source Code Disclosure Vulnerability
    Risk: Low
  * FID #10030 Xerver Administration Interface currentPath Cross Site Scripting Vulnerability
    Risk: Low
  * FID #10065 Home FTP Server 'MKD' Command Multiple Directory Traversal Vulnerabilities
    Risk: Low
  * FID #12030 Cisco IOS DNS Cache Poisoning Attack Vulnerability
    Risk: Low
  * FID #12146 Google Chrome Bypass Pop Up Blocker Bypass
    Risk: Low
  * FID #41673 Red Hat Enterprise Linux RHSA-2011-0844 Update Is Not Installed
    Risk: Low
  * FID #50252 Ubuntu Linux 10.04, 8.04 LTS USN-1138-2 Update Is Not Installed
    Risk: Low
  * FID #50254 Ubuntu Linux 10.04, 8.04 LTS USN-1138-1 Update Is Not Installed
    Risk: Low
  * FID #50255 Ubuntu Linux 10.04, 10.10, 11.04 USN-1137-1 Update Is Not Installed
    Risk: Low
  * FID #50257 Ubuntu Linux 10.04, 10.10, 11.04 USN-1135-1 Update Is Not Installed
    Risk: Low
  * FID #50259 Ubuntu Linux 10.04, 10.10, 11.04 USN-1136-1 Update Is Not Installed
    Risk: Low
  * FID #55108 Top Weekly Malware Env - FakeAlert-Loader (loader_156.exe)
    Risk: Low
  * FID #58136 Debian Linux 5.0, 6.0 DSA-2250-1 Update Is Not Installed
    Risk: Low
  * FID #58138 Debian Linux 5.0, 6.0 DSA-2242-1 Update Is Not Installed
    Risk: Low
  * FID #58139 Debian Linux 6.0 DSA-2249-1 Update Is Not Installed
    Risk: Low
  * FID #58140 Debian Linux 5.0, 6.0 DSA-2244-1 Update Is Not Installed
    Risk: Low
  * FID #58141 Debian Linux 5.0 DSA-2243-1 Update Is Not Installed
   Risk: Low
  * FID #58142 Debian Linux 5.0, 6.0 DSA-2246-1 Update Is Not Installed
   Risk: Low
  * FID #58143 Debian Linux 6.0 DSA-2245-1 Update Is Not Installed
   Risk: Low
  * FID #58144 Debian Linux 5.0, 6.0 DSA-2248-1 Update Is Not Installed
   Risk: Low
  * FID #81651 Fedora Linux 14 FEDORA-2011-7258 Update Is Not Installed
   Risk: Low
  * FID #81653 Fedora Linux 14 FEDORA-2011-0111 Update Is Not Installed
   Risk: Low
  * FID #81654 Fedora Linux 13 FEDORA-2011-7272 Update Is Not Installed
   Risk: Low
  * FID #81655 - Fedora Linux 13 FEDORA-2011-7198 Update Is Not Installed
   Risk: Low
  * FID #81656 - Fedora Linux 15 FEDORA-2011-7268 Update Is Not Installed
   Risk: Low
  * FID #81657 - Fedora Linux 15 FEDORA-2011-7434 Update Is Not Installed
   Risk: Low
  * FID #81658 - Fedora Linux 15 FEDORA-2011-7540 Update Is Not Installed
   Risk: Low
  * FID #81659 - Fedora Linux 14 FEDORA-2011-7229 Update Is Not Installed
   Risk: Low
  * FID #81660 - Fedora Linux 15 FEDORA-2011-6838 Update Is Not Installed
   Risk: Low
  * FID #81661 - Fedora Linux 13 FEDORA-2011-0074 Update Is Not Installed
   Risk: Low
  * FID #81662 - Fedora Linux 14 FEDORA-2011-7222 Update Is Not Installed
   Risk: Low
  * FID #81663 - Fedora Linux 15 FEDORA-2011-7185 Update Is Not Installed
   Risk: Low
  * FID #81664 - Fedora Linux 15 FEDORA-2011-7245 Update Is Not Installed
   Risk: Low
  * FID #81666 - Fedora Linux 15 FEDORA-2011-7176 Update Is Not Installed
   Risk: Low
  * FID #81667 - Fedora Linux 14 FEDORA-2011-6914 Update Is Not Installed
   Risk: Low
  * FID #81668 - Fedora Linux 15 FEDORA-2011-7183 Update Is Not Installed
   Risk: Low
  * FID #81670 - Fedora Linux 13 FEDORA-2011-2570 Update Is Not Installed
   Risk: Low
  * FID #81671 - Fedora Linux 15 FEDORA-2011-7426 Update Is Not Installed
   Risk: Low
  * FID #81672 - Fedora Linux 14 FEDORA-2011-6931 Update Is Not Installed
   Risk: Low
  * FID #81673 - Fedora Linux 15 FEDORA-2011-7314 Update Is Not Installed
   Risk: Low
  * FID #83571 - FreeBSD drupal6 Multiple Vulnerabilities (1acf9ec5-877d-11e0-b937-001372fd0af2)
   Risk: Low
  * FID #83572 - FreeBSD erlang Ssh Library Uses A Weak Random Number Generator (e4833927-86e5-11e0-a6b4-
000a5e1e33c6)
   Risk: Low
  * FID #83573 - FreeBSD unbound An Empty Error Packet Handling Assertion Failure (dc96ac1f-86b1-11e0-9e85-
00215af774f0)
Risk: Low
  * FID #85133 - CentOS 5 CESA-2011-0844 Update Is Not Installed
   Risk: Low
  * FID #88428 - Slackware Linux 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, 8.1, 9.0, 9.1 SSA:2011-
147-01 Update Is Not Install
   Risk: Low
  * FID #88429 - Slackware Linux 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37 SSA:2011-145-01 Update Is Not Installed
   Risk: Low
  * FID #88430 - Slackware Linux 12.0, 12.1, 12.2, 13.0, 13.1, 13.37 SSA:2011-145-02 Update Is Not Installed
   Risk: Low
  * FID #92766 - Mandriva Linux 2009.0, 2010.1 MDVSA-2011-101 Update Is Not Installed
   Risk: Low
  * FID #92767 - Mandriva Linux 2009.0, 2010.1 MDVSA-2011-102 Update Is Not Installed
   Risk: Low
  * FID #94550 - SuSE SLES 11 SP1 osasnmpd-4541 Update Is Not Installed
   Risk: Low
  * FID #94551 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 yast2-ldap-client-4492 Update Is Not Installed
   Risk: Low
  * FID #94552 - SuSE SLED 11 SP1 mhtml-firefox-4598 Update Is Not Installed
   Risk: Low
  * FID #94553 - SuSE SLES 10 SP3 pure-ftpd-7466 Update Is Not Installed
   Risk: Low
  * FID #94554 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 gnome-panel-4573 Update Is Not Installed
   Risk: Low
  * FID #94555 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 pure-ftpd-4360 Update Is Not Installed
   Risk: Low
  * FID #94556 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 at-4571 Update Is Not Installed
   Risk: Low
  * FID #94557 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 tk-4513 Update Is Not Installed
   Risk: Low
  * FID #94558 - SuSE SLES 10 SP3 logrotate-7534 Update Is Not Installed
   Risk: Low
  * FID #94559 - SuSE SLES 10 SP4, SLED 10 SP4 at-7535 Update Is Not Installed
   Risk: Low
  * FID #94560 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 apparmor-parser-4567 Update Is Not Installed
   Risk: Low
  * FID #94561 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 gdm-4605 Update Is Not Installed
   Risk: Low
  * FID #94562 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 kdelibs4-4407 Update Is Not Installed
   Risk: Low
  * FID #94563 - SuSE SLES 11 SP1, SLED 11 SP1 virt-utils-qemu-4600 Update Is Not Installed
   Risk: Low
  * FID #94565 - SuSE SLED 10 SP4 ruby-7528 Update Is Not Installed
   Risk: Low
  * FID #94564 - SuSE SLES 10 SP4, SLED 10 SP4 logrotate-7533 Update Is Not Installed
   Risk: Low
  * FID #94566 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 perl-libwww-perl-4603 Update Is Not Installed
   Risk: Low
  * FID #94567 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 yast2-ncurses-4504 Update Is Not Installed
   Risk: Low
  * FID #94568 - SuSE SLES 10 SP4, SLED 10 SP4 pure-ftpd-7480 Update Is Not Installed
   Risk: Low
  * FID #94569 - SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 logrotate-4583 Update Is Not Installed
   Risk: Low
  * FID #9844 - SOCKS4 Server Connection To Self Allowed
   Risk: Informational
  * FID #9962 - Web Server HTTP DELETE Method Access Detected
   Risk: Informational
   * FID #9964 - Web Server Dangerous CGI Scripts Detected
   Risk Level: Informational
  * FID #9965 - DNS Server UDP Query Limitation Detected
   Risk: Informational
  * FID #9971 - IPSEC Internet Key Exchange Detected
   Risk: Informational
  * FID #9995 - Microsoft .Net Remoting TCP Channel Detected
   Risk: Informational
  * FID #10203 - Web Server cgi-bin Directory Browsing Access Detected
   Risk: Informational
  * FID #10206 - Citrix Netscaler Web Management Interface Detected
   Risk: Informational 
  * FID #10277 - Oracle Database Server Version Below 10.1 Detected
   Risk: Informational
  * FID #11974 - Apache Hadoop HDFS NameNode Web Detected
   Risk: Informational
  * FID #11975 - Apache Hadoop HDFS DataNode Web Detected
   Risk: Informational
  * FID #11978 - Apache Hadoop MapReduce JobTracker Web Detection
   Risk: Informational
  * FID #11991 - AFS Client Version Detected
   Risk: Informational
  * FID #12009 - L2TP Network Server Detection
   Risk: Informational
  * FID #12031 - Apache CouchDB Detection
   Risk: Informational
  * FID #12032 - Barracuda Spam & Virus Firewall Console Management Detection
   Risk: Informational
  * FID #12040 - Kerio Mailserver Admin Service Detected
   Risk: Informational
  * FID #12045 - ACAP Service STARTTLS Command Support Detection
   Risk: Informational

改善されたチェック項目:

  * FID #9834 - Web Server Incomplete Basic Authentication Denial Of Service Vulnerability
   Risk: High
  * FID #10472 - CUPS Negative Content-Length memcpy Denial Of Service Vulnerability  
   Risk: High
  * FID #10646 - DokuWiki spellchecker Remote PHP Script Code Injection Vulnerability
   Risk: High
  * FID #12021 - HP System Management Homepage Stack Consumption Denial of Service
   Risk: High
  * FID #30826 - Sun Solaris 114015-28 Update Is Not Installed
   Risk: High
  * FID #32095 - Sun Solaris 125332-17 Update Is Not Installed
   Risk: High
  * FID #32096 - Sun Solaris 125333-16 Update Is Not Installed
   Risk: High
  * FID #10204 - Webcom Guestbook.cgi Arbitrary Command Execution Vulnerability
   Risk: Medium
  * FID #30072 - Sun Solaris 114014-28 Update Is Not Installed
   Risk: Medium
  * FID #30827 - Sun Solaris 114017-07 Update Is Not Installed
   Risk: Medium
  * FID #32270 - Sun Solaris 139099-06 Update Is Not Installed
   Risk: Medium
  * FID #32272 - Sun Solaris 139100-06 Update Is Not Installed
   Risk: Medium
  * FID #31623 - Sun Solaris 125719-40 Update Is Not Installed
   Risk: Low
  * FID #32033 - Sun Solaris 119900-12 Update Is Not Installed
   Risk: Low
  * FID #32034 - Sun Solaris 119901-11 Update Is Not Installed
   Risk: Low
  * FID #32647 - Sun Solaris 125326-03 Update Is Not Installed
   Risk: Low
  * FID #32655 - Sun Solaris 119906-18 Update Is Not Installed
   Risk: Low
  * FID #32660 - Sun Solaris 119907-18 Update Is Not Installed
   Risk: Low
  * FID #32726 - Sun Solaris 143645-16 Update Is Not Installed
   Risk: Low
  * FID #32734 - Sun Solaris 143646-16 Update Is Not Installed
   Risk: Low
  * FID #32761 - Sun Solaris 145081-04 Update Is Not Installed
   Risk: Low
  * FID #32765 - Sun Solaris 145080-04 Update Is Not Installed
   Risk: Low
  * FID #83482 - FreeBSD chromium Multiple Vulnerabilities (6887828f-0229-11e0-b84d-00262d5ed8ee)
   Risk: Low
  * FID #52236 - Red Hat Enterprise Linux Default Service Disabled
   Risk: Informational
  * FID #53110 - IBM AIX User Password maxage Configuration Existence
   Risk: Informational
  * FID #53111 - IBM AIX User Password mindiff Configuration Existence
   Risk: Informational
  * FID #53128 - IBM AIX User Password histsize Configuration Existence
   Risk: Informational
  * FID #53129 - IBM AIX User Password minlen Configuration Existence
   Risk: Informational
  * FID #53133 - IBM AIX User Password minother Configuration Existence
   Risk: Informational
  * FID #53135 - IBM AIX User Password minalpha Configuration Existence
   Risk: Informational
  * FID #53136 - IBM AIX User Password minage Configuration Existence
   Risk: Informational
  * FID #70088 - ibm.fasl3.inc
   Risk: Informational

削除されたチェック項目:

  * FID #9422 - Apple iOS Default Root Account Password
   Risk: High

-------------------------------------------------------
2) アプライアンス OSパッチアップデート
-------------------------------------------------------
 期間: 2011/06/01 ~ 2011/06/06 (日本時間)

今回のアップデートはございません。

-------------------------------------------------------
3) 企業向けサポートコミュニティサイトの開設および Twitter サービスの開始について
-------------------------------------------------------
○ お知らせ

企業向けサポートコミュニティサイト「Japan Corporate Support」を開設いたしました。
また、「企業向けお客様サポート公式 Twitter」を開設し、サポート情報のリアルタイム
配信を開始しました。

マカフィー、ユーザー参加型の企業向け製品コミュニティサイトをオープン
~サポート部門が主体となり企業セキュリティに関するディスカッションの場を提供~
(4月18日発プレスリリース)
http://www.mcafee.com/japan/about/prelease/pr_11a.asp?pr=11/04/18-1

● 開始日

2011/04/18 (月) 9:00

○ 備考

- 企業向けサポートコミュニティサイト「Japan Corporate Support」
   https://community.mcafee.com/community/japan
   サポート通信や FAQ 掲載情報、製品及びパッチのリリース情報やドキュメントが掲載
   されます。また、製品に関する技術的な情報に関して、コミュニティご登録者が参加
   可能なフリーディスカッションのスペースがございます。

- 企業向けお客様サポート公式 Twitter
   http://twitter.com/McAfee_BTS_JP
   Twitter サービスを利用し、サポート通信や FAQ 掲載情報、製品及びパッチのリリー
   ス情報がリアルタイムで配信されます。

  コミュニティサイトの登録方法、 Twitter のフォロー方法などの詳細につきましては、
  以下のページをご覧ください。
  http://www.mcafee.com/Japan/support/japancorporate.asp

-------------------------------------------------------
4) McAfee Vulnerability Manager Software 旧バージョンソフトウェアv6.7サポート終了について
-------------------------------------------------------

McAfee Vulnerability Manager Softwareにつきまして、以下の旧バージョンは
サポート終了を予定しておりますのでご案内いたします。

McAfee Vulnerability Manager Software v6.7
サポート終了日:2011年6月30日

■備考
・現在の最新バージョンは、McAfee Vulnerability Manager Software v7.0となり、
「フルサービス・ハードウェア・サポート」(製品として弊社が提供する全てのサポート内容)をご利用いただけます。
本バージョンへの移行やサポート内容の詳細は、弊社サポート窓口までお問い合わせください。
・本製品のサポート終了日は、以下URLに掲載されます。
http://www.mcafee.com/Japan/support/customer_support/productsupport.asp
・本製品に標準搭載されているWebサイトの脆弱性スキャン機能は、現在製品内容の見直しが図られており、
 McAfee Vulnerability Manager Software v6.7.x および v6.8.x が本機能を搭載した最後のバージョンとなる予定です。
 v6.7.x およびv6.8.x のサポート終了日まではサポートが継続されます。後継については、確定次第、別途ご案内させていただきます。
・アップグレードのツールおよび手順書は、ダウンロードページよりご入手いただけます。
 http://www.mcafee.com/japan/licensed2/

-------------------------------------------------------
5) 「サポート通信」登録方法変更のお知らせ
-------------------------------------------------------
サポート通信の登録方法が下記の通り変更となりましたのでお知らせいたします。

6月1日以降に新規契約をしたお客様には、4種類のサポート通信を配信いたします。各種サ
ポート通信が不要な方は、各サポート通信の文末に記載されているURLにアクセスして、解除
手続きを行っていただきます。

障害などでサポート窓口にお問い合わせいただいた新規のご担当者様には、今までどおり、
「サポート通信 - 登録のご案内」メールを1回のみ配信いたします。
http://www.mcafee.com/japan/support/customer_support/techsupport_regform.asp

---------------------------------------------------------
※ マカフィーからのサービス
---------------------------------------------------------
○マカフィーサポート通信について
- 配信停止
  「マカフィー サポート通信 - リスク管理ソリューション 」の配信停止をご希望される方は、
  以下のページより手続きをお願い致します。
 https://md.pbz.jp/s/r-ctrl.php?act=PCDelAuth&funcinfo_allreset=1&uid=mcafee&mid= foundstone_supp
- 各種法人ユーザ登録情報の変更はこちら
   ⇔ http://www.mcafee.com/japan/support/customer_support/tourokuhenkou.asp

○マカフィーでは、製品の技術的FAQ等多くのサービスや情報提供を行っています。是非ご活用ください。
 http://www.mcafee.com/japan/support/

●===McAfee=============================================○
発信元:
マカフィー株式会社
テクニカルサポートセンター インフォメーション係
(c) 2011 McAfee, Inc. All Rights Reserved.
お客様は,マカフィー株式会社の事前の書面による承諾を得ることなく、
掲載内容の無断転載を禁じます。
○=============================================McAfee===●