==============================================================

 

マカフィー サポート通信 - リスク管理ソリューション 2011.10.17

==============================================================

 

本メールはMcAfee Vulnerability Manager製品のサポートをご購入のお客様

に配信しております。

 

○-======  今週のマカフィー Vulnerability Manager (目次)  =======-○

1) FSL UPDATE

2) OSパッチアップデート

3) McAfee Vulnerability Manager Software v6.8のサポート終了について

4) サポートコミュニティサイトでのテクニカルドキュメント公開

5) 企業向けサポートコミュニティサイトの開設および Twitter サービスの開始について

6) 「サポート通信」配信について

 

※) マカフィーからのサービス

○-===================================================-○

 

-------------------------------------------------------

1) FSL UPDATE

-------------------------------------------------------

マカフィーは以下のVulnerability Manager製品のアップデートを提供しています。

最新更新日: 2011-OCT-13

 

(SUMMARY)

 

新しいチェック項目     :      75

改善されたチェック項目 :     285

削除されたチェック項目 :       1

 

 追加・改善されたシグネチャ項目等の詳細は以下の製品ダウンロード

 ページから「McAfee Foundstone Update」の最新版を入手してください。

 

 http://www.mcafee.com/japan/licensed2/

 

新しいチェック項目:

 

  * FID #12712 Novell GroupWise Internet Agent HTTP Interface Remote Code Execution

    Risk: High

  * FID #12713 Novell GroupWise Internet Agent TZNAME Parsing Remote Code Execution

    Risk: High

  * FID #12716 Novell GroupWise Internet Agent Denial Of Service CVE-2011-2218

    Risk: High

  * FID #12717 Novell GroupWise Internet Agent BYDAY Property Denial Of Service Vulnerability

    Risk: High

  * FID #12718 Novell GroupWise Internet Agent Weekly RRULE Remote Code Execution Vulnerability

    Risk: High

  * FID #12719 Novell GroupWise Internet Agent Yearly RRULE Remote Code Execution Vulnerability

    Risk: High

  * FID #12722 Novell GroupWise Internet Agent Weekday RRULE Remote Code Execution Vulnerability

    Risk: High

  * FID #12723 Mozilla Thunderbird Multiple Vulnerabilities Prior To 7.0

    Risk: High

  * FID #12725 Cisco IOS Software Smart Install Remote Code Execution

    Risk: High

  * FID #12726 Cisco IOS Software Smart Install Remote Code Execution

    Risk: High

  * FID #12727 (HPSBUX02707) HP-UX Apache Web Server Remote Denial Of Service Vulnerabilities

    Risk: High

  * FID #12731 Cisco IOS Data Link Switching Memory Leak Remote Denial Of Service

    Risk: High

  * FID #12732 Cisco IOS Data Link Switching Memory Leak Remote Denial Of Service

    Risk: High

  * FID #12765 VMware UDF Filesystem Buffer Overflow Remote Code Execution

    Risk: High

  * FID #12766 VMware UDF Filesystem Buffer Overflow Remote Code Execution

    Risk: High

  * FID #12783 eSignal Insecure Library Loading Remote Code Execution

    Risk: High

  * FID #12790 RealNetworks RealPlayer Cross-Zone Scripting Remote Code Execution II

    Risk: High

  * FID #12798 Sunway ForceControl SNMP NetDBServer Stack Buffer Overflow Remote Code Execution

    Risk: High

  * FID #58222 Debian Linux 5.0, 6.0 DSA-2322-1 Update Is Not Installed

    Risk: High

  * FID #81998 Fedora Linux 14 FEDORA-2011-12874 Update Is Not Installed

    Risk: High

  * FID #90855 Oracle Enterprise Linux ELSA-2011-1350 Update Is Not Installed

    Risk: High

  * FID #90856 Oracle Enterprise Linux ELSA-2011-2029 Update Is Not Installed

    Risk: High

  * FID #92814 Mandriva Linux 2009.0, 2010.1 MDVSA-2011-146 Update Is Not Installed

    Risk: High

  * FID #12649 WordPress PhotoSmash Plugin action Cross Site Scripting Vulnerability

    Risk: Medium

  * FID #12715 Novell GroupWise WebAccess Directory.Item Parameters Cross-Site Scripting

    Risk: Medium

  * FID #12729 Cisco IOS Software Packet Inspection Memory Leak Denial of Service

    Risk: Medium

  * FID #12730 Cisco IOS Software HTTP Packet Processing Denial of Service

    Risk: Medium

  * FID #12767 Cisco IOS Software NetMeeting Directory LDAP Network Address Translation Processing Denial of Service

    Risk: Medium

  * FID #12768 Cisco IOS Software NetMeeting Directory LDAP Network Address Translation Processing Denial of Service

    Risk: Medium

  * FID #12769 Cisco IOS Software Session Initiation Protocol Network Address Translation Denial of Service

    Risk: Medium

  * FID #12770 Cisco IOS Software Session Initiation Protocol Network Address Translation Denial of Service

    Risk: Medium

  * FID #12771 Cisco IOS Software H.323 Packet Network Address Translation Denial of Service

    Risk: Medium

  * FID #12772 Cisco IOS Software H.323 Packet Network Address Translation Denial of Service

    Risk: Medium

  * FID #12773 Cisco IOS Software Session Initiation Protocol UDP Packet Network Address Translation Denial of Service

    Risk: Medium

  * FID #12774 Cisco IOS Software Session Initiation Protocol UDP Packet Network Address Translation Denial of Service

    Risk: Medium

  * FID #12775 Cisco IOS Software MPLS Packet Network Address Translation Denial of Service

    Risk: Medium

  * FID #12776 Cisco IOS Software MPLS Packet Network Address Translation Denial of Service

    Risk: Medium

  * FID #12777 Cisco IOS Software Session Initiation Protocol UDP Packet Network Address Translation Denial of Service II

    Risk: Medium

  * FID #12778 Cisco IOS Software Session Initiation Protocol UDP Packet Network Address Translation Denial of Service II

    Risk: Medium

  * FID #12779 Cisco IOS Software Crafted IPv6 over MPLS Denial of Service

    Risk: Medium

  * FID #12780 Cisco IOS Software Crafted IPv6 over MPLS Denial of Service

    Risk: Medium

  * FID #12781 Cisco IOS Software ICMPv6 Packet Multiprotocol Label Switching Denial of Service

    Risk: Medium

  * FID #12782 Cisco IOS Software ICMPv6 Packet Multiprotocol Label Switching Denial of Service

    Risk: Medium

  * FID #12784 Cisco IOS Software Session Initiation Protocol Packet Processing Denial of Service

    Risk: Medium

  * FID #12785 Cisco IOS Software Session Initiation Protocol Packet Processing Denial of Service

    Risk: Medium

  * FID #12786 Cisco IOS Software Session Initiation Protocol Memory Leak Denial of Service

    Risk: Medium

  * FID #12787 Cisco IOS Software Session Initiation Protocol Memory Leak Denial of Service

    Risk: Medium

  * FID #12788 Cisco IOS Software and Cisco Unified Communications Manager Session Initiation Protocol Packet Handling Denial of Service

    Risk: Medium

  * FID #12789 Cisco IOS Software and Cisco Unified Communications Manager Session Initiation Protocol Packet Handling Denial of Service

    Risk: Medium

  * FID #12801 IBM WebSphere MQ Invalid Message Remote Buffer Overflow Vulnerability

    Risk: Medium

  * FID #41768 Red Hat Enterprise Linux RHSA-2011-1364 Update Is Not Installed

    Risk: Medium

  * FID #32882 Sun Solaris 147714-01 Update Is Not Installed

    Risk: Low

  * FID #32883 Sun Solaris 147713-01 Update Is Not Installed

    Risk: Low

  * FID #50359 Ubuntu Linux 10.10 USN-1227-1 Update Is Not Installed

    Risk: Low

  * FID #58219 Debian Linux 5.0, 6.0 DSA-2321-1 Update Is Not Installed

    Risk: Low

  * FID #58220 Debian Linux 6.0 DSA-2319-1 Update Is Not Installed

    Risk: Low

  * FID #58221 Debian Linux 5.0 DSA-2320-1 Update Is Not Installed

    Risk: Low

  * FID #81992 Fedora Linux 14 FEDORA-2011-13458 Update Is Not Installed

    Risk: Low

  * FID #81993 Fedora Linux 15 FEDORA-2011-13785 Update Is Not Installed

    Risk: Low

  * FID #81994 Fedora Linux 14 FEDORA-2011-13181 Update Is Not Installed

    Risk: Low

  * FID #81995 Fedora Linux 16 FEDORA-2011-13766 Update Is Not Installed

    Risk: Low

  * FID #81996 Fedora Linux 15 FEDORA-2011-13446 Update Is Not Installed

    Risk: Low

  * FID #81997 Fedora Linux 14 FEDORA-2011-13450 Update Is Not Installed

    Risk: Low

  * FID #81999 Fedora Linux 15 FEDORA-2011-13214 Update Is Not Installed

    Risk: Low

  * FID #86000 Fedora Linux 14 FEDORA-2011-13401 Update Is Not Installed

    Risk: Low

  * FID #86001 Fedora Linux 16 FEDORA-2011-13472 Update Is Not Installed

    Risk: Low

  * FID #92810 Mandriva Linux 2009.0, 2010.1, 2011.0 MDVSA-2011-145 Update Is Not Installed

    Risk: Low

  * FID #92811 Mandriva Linux 2011.0 MDVSA-2011-147 Update Is Not Installed

    Risk: Low

  * FID #92812 Mandriva Linux 2011.0 MDVSA-2011-131-1 Update Is Not Installed

    Risk: Low

  * FID #92813 Mandriva Linux 2009.0, 2010.1, 2011.0 MDVSA-2011-144 Update Is Not Installed

    Risk: Low

  * FID #94828 SuSE SLES 11 SP1 kernel-5222 Update Is Not Installed

    Risk: Low

  * FID #94829 SuSE SLES 11 SP1 kernel-5220 Update Is Not Installed

    Risk: Low

  * FID #94830 SuSE SLES 11, 11 SP1, SLED 11, 11 SP1 kernel-5219 Update Is Not Installed

    Risk: Low

  * FID #94831 SuSE SLES 11, SLED 11, 11 SP1 kernel-5223 Update Is Not Installed

    Risk: Low

  * FID #94832 SuSE SLES 11 SP1 kernel-5221 Update Is Not Installed

    Risk: Low

 

改善されたチェック項目:

 

  * FID #5230 (MS07-033) Microsoft Language Pack Installation Vulnerability (933566)

    Recommendation is updated

  * FID #5231 (MS07-033) Microsoft Uninitialized Memory Corruption Vulnerability (933566)

    Recommendation is updated

  * FID #5232 (MS07-033) Microsoft Speech Control Memory Corruption Vulnerability (933566)

    Recommendation is updated

  * FID #5517 (MS07-057) Microsoft Internet Explorer Script Error Handling Memory Corruption Vulnerability (939653)

    Recommendation is updated

  * FID #6283 (MS08-073) Microsoft Internet Explorer HTML Objects Memory Corruption Vulnerability (958215)

    Recommendation is updated

  * FID #6284 (MS08-073) Microsoft Internet Explorer HTML Rendering Memory Corruption Vulnerability (958215)

    Recommendation is updated

  * FID #6285 (MS08-073) Microsoft Internet Explorer Parameter Validation Memory Corruption Vulnerability (958215)

    Recommendation is updated

  * FID #6286 (MS08-073) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (958215)

    Recommendation is updated

  * FID #6301 Microsoft Internet Explorer Nexted XML Code Execution Vulnerability

    Recommendation is updated

  * FID #6424 (MS09-002) Microsoft Internet Explorer CSS Memory Corruption Vulnerability CVE-2009-0075 (961260)

    Recommendation is updated

  * FID #6425 (MS09-002) Microsoft Internet Explorer CSS Memory Corruption Vulnerability CVE-2009-0076 (961260)

    Recommendation is updated

  * FID #6492 (MS09-006) Microsoft Windows Kernel Input Validation Vulnerability (958690)

    Recommendation is updated

  * FID #6606 (MS09-014) Microsoft Internet Explorer Page Transition Memory Corruption Vulnerability (963027)

    Recommendation is updated

  * FID #6607 (MS09-014) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (963027)

    Recommendation is updated

  * FID #6608 (MS09-014) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability II (963027)

    Recommendation is updated

  * FID #6609 (MS09-014) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability III (963027)

    Recommendation is updated

  * FID #6610 (MS09-014) Microsoft Internet Explorer WinINet Remote Code Execution vulnerability (963027)

    Recommendation is updated

  * FID #6745 (MS09-019) Microsoft Internet Explorer DHTML Object Memory Corruption Vulnerability (969897)

    Recommendation is updated

  * FID #6746 (MS09-019) Microsoft Internet Explorer HTML Object Memory Corruption (969897)

    Recommendation is updated

  * FID #6747 (MS09-019) Microsoft Internet Explorer HTML Objects Memory Corruption Vulnerability (969897)

    Recommendation is updated

  * FID #6748 (MS09-019) Microsoft Internet Explorer HTML Objects Memory Corruption Vulnerability II (969897)

    Recommendation is updated

  * FID #6749 (MS09-019) Microsoft Internet Explorer HTML Objects Memory Corruption Vulnerability III (969897)

    Recommendation is updated

  * FID #6751 (MS09-019) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (969897)

    Recommendation is updated

  * FID #6901 (MS09-035) ATL Uninitialized Object Vulnerability (969706)

    Recommendation is updated

  * FID #6902 (MS09-035) ATL COM Initialization Vulnerability  (969706)

    Recommendation is updated

  * FID #6904 (MS09-034) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (972260)

    Recommendation is updated

  * FID #6905 (MS09-034) Microsoft Internet Explorer HTML Objects Memory Corruption Vulnerability (972260)

    Recommendation is updated

  * FID #6906 (MS09-034) Microsoft Internet Explorer Memory Corruption Vulnerability (972260)

    Recommendation is updated

  * FID #7194 (MS09-054) Data Stream Header Corruption Vulnerability (974455)

    Recommendation is updated

  * FID #7195 (MS09-054) Uninitialized Memory Corruption Vulnerability (974455)

    Recommendation is updated

  * FID #7196 (MS09-054) HTML Component Handling Vulnerability (974455)

    Recommendation is updated

  * FID #7197 (MS09-054) Uninitialized Memory Corruption Vulnerability II (974455)

    Recommendation is updated

  * FID #7208 (MS09-061) Microsoft .NET Framework CAS Pointer Verification Vulnerability (974378)

    Recommendation is updated

  * FID #7209 (MS09-061) Microsoft .NET Framework CAS Type Verification Vulnerability II (974378)

    Recommendation is updated

  * FID #7224 (MS09-054) Cumulative Security Update For Internet Explorer (974455)

    Recommendation is updated

  * FID #7225 (MS09-061) Vulnerabilities In The Microsoft .NET Common Language Runtime Could Allow Remote Code Execution (974378)

    Recommendation is updated

  * FID #7316 (MS09-065) Win32k NULL Pointer Dereferencing Vulnerability (969947)

    Recommendation is updated

  * FID #7317 (MS09-065) Win32k Insufficient Data Validation Vulnerability (969947)

    Recommendation is updated

  * FID #7318 (MS09-065) Win32k EOT Parsing Vulnerability (969947)

    Recommendation is updated

  * FID #7332 (MS09-065) Vulnerabilities In Windows Kernel-Mode Drivers Could Allow Remote Code Execution (969947)

    Recommendation is updated

  * FID #7346 (MS09-014) Cumulative Security Update For Internet Explorer (963027)

    Recommendation is updated

  * FID #7350 (MS09-002) Cumulative Security Update For Internet Explorer (961260)

    Recommendation is updated

  * FID #7377 (MS09-019) Cumulative Security Update for Internet Explorer (969897)

    Recommendation is updated

  * FID #7413 (MS09-006) Vulnerabilities In Windows Kernel Could Allow Remote Code Execution (958690)

    Recommendation is updated

  * FID #7456 (MS09-072) ATL COM Initialization Vulnerability (976325)

    Recommendation is updated

  * FID #7457 (MS09-072) Uninitialized Memory Corruption Vulnerability (976325)

    Recommendation is updated

  * FID #7458 (MS09-072) HTML Object Memory Corruption Vulnerability (976325)

    Recommendation is updated

  * FID #7459 (MS09-072) Uninitialized Memory Corruption Vulnerability III (976325)

    Recommendation is updated

  * FID #7460 (MS09-072) Uninitialized Memory Corruption Vulnerability II (976325)

    Recommendation is updated

  * FID #7466 (MS09-072) Cumulative Security Update For Internet Explorer (976325)

    Recommendation is updated

  * FID #7529 (MS09-035) Vulnerabilities In Visual Studio Active Template Library Could Allow Remote Code Execution (969706)

    Recommendation is updated

  * FID #7677 (MS10-002) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability II (978207)

    Recommendation is updated

  * FID #7681 (MS08-061)Vulnerabilities In Windows Kernel Could Allow Elevation Of Privilege (954211)

    Recommendation is updated

  * FID #7724 (MS10-002) Microsoft Internet Explorer URL Validation Vulnerability (978207)

    Recommendation is updated

  * FID #7725 (MS10-002) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (978207)

    Recommendation is updated

  * FID #7726 (MS10-002) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability II (978207)

    Recommendation is updated

  * FID #7727 (MS10-002) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability III (978207)

    Recommendation is updated

  * FID #7728 (MS10-002) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability IV (978207)

    Recommendation is updated

  * FID #7729 (MS10-002) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability (978207)

    Recommendation is updated

  * FID #7731 (MS08-024) Cumulative Security Update For Internet Explorer (947864)

    Recommendation is updated

  * FID #7743 (MS10-002) Cumulative Security Update For Internet Explorer (978207)

    Recommendation is updated

  * FID #7804 (MS08-031) Cumulative Security Update For Internet Explorer (950759)

    Recommendation is updated

  * FID #7817 (MS10-035) Microsoft Internet Explorer Cross-Domain Information Disclosure Vulnerability (982381)

    Recommendation is updated

  * FID #7825 (MS08-010) Cumulative Security Update For Internet Explorer (944533)

    Recommendation is updated

  * FID #8099 (MS08-045) Cumulative Security Update For Internet Explorer (953838)

    Recommendation is updated

  * FID #8115 (MS10-018) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability III (980182)

    Recommendation is updated

  * FID #8324 (MS10-018) Microsoft Internet Explorer Memory Corruption Vulnerability (980182)

    Recommendation is updated

  * FID #8325 (MS10-018) Microsoft Internet Explorer HTML Rendering Memory Corruption Vulnerability (980182)

    Recommendation is updated

  * FID #8326 (MS10-018) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability II (980182)

    Recommendation is updated

  * FID #8328 (MS10-018) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability II (980182)

    Recommendation is updated

  * FID #8329 (MS10-018) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability (980182)

    Recommendation is updated

  * FID #8330 (MS10-018) Microsoft Internet Explorer Race Condition Memory Corruption Vulnerability (980182)

    Recommendation is updated

  * FID #8332 (MS10-018) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (980182)

    Recommendation is updated

  * FID #8333 (MS10-018) Cumulative Security Update For Internet Explorer (980182)

    Recommendation is updated

  * FID #8389 (MS08-073) Cumulative Security Update For Internet Explorer (958215)

    Recommendation is updated

  * FID #8394 (MS08-078) Security Update For Internet Explorer (960714)

    Recommendation is updated

  * FID #9065 (MS10-035) Cumulative Security Update for Internet Explorer (982381)

    Recommendation is updated

  * FID #9078 (MS10-035) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (982381)

    Recommendation is updated

  * FID #9079 (MS10-035) Microsoft HTML Element Memory Corruption Vulnerability (982381)

    Recommendation is updated

  * FID #9080 (MS10-035) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (982381) CVE-2010-1261

    Recommendation is updated

  * FID #9081 (MS10-035) Microsoft Internet Explorer Memory Corruption Vulnerability (982381)

    Recommendation is updated

  * FID #9694 (MS10-048) Microsoft Windows Win32k Window Creation Vulnerability (2160329)

    Recommendation is updated

  * FID #9695 (MS10-048) Microsoft Windows Win32k User Input Validation Vulnerability (2160329)

    Recommendation is updated

  * FID #9696 (MS10-048) Microsoft Windows Win32k Exception Handling Vulnerability (2160329)

    Recommendation is updated

  * FID #9697 (MS10-048) Microsoft Windows Win32k Pool Overflow Vulnerability (2160329)

    Recommendation is updated

  * FID #9698 (MS10-048) Microsoft Windows Win32k Bounds Checking Vulnerability (2160329)

    Recommendation is updated

  * FID #9699 (MS10-053) Microsoft Internet Explorer HTML Layout Memory Corruption Vulnerability (2183461)

    Recommendation is updated

  * FID #9700 (MS10-053) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (2183461)

    Recommendation is updated

  * FID #9701 (MS10-053) Microsoft Internet Explorer Race Condition Memory Corruption Vulnerability (2183461)

    Recommendation is updated

  * FID #9702 (MS10-053) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability CVE-2010-2557 (2183461)

    Recommendation is updated

  * FID #9703 (MS10-053) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability CVE-2010-2556 (2183461)

    Recommendation is updated

  * FID #9704 (MS10-053) Microsoft Internet Explorer Event Handler Cross-Domain Vulnerability (2183461)

    Recommendation is updated

  * FID #9705 (MS10-060) Microsoft Windows Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate Vulnerability (22659

    Recommendation is updated

  * FID #9706 (MS10-060) Vulnerability in Microsoft Silverlight Could Allow Remote Code Execution (978464)

    Recommendation is updated

  * FID #9723 (MS10-053) Cumulative Security Update for Internet Explorer (2183461)

    Recommendation is updated

  * FID #9724 (MS10-060) Vulnerabilities In Microsoft Silverlight And .NET CLR Could Allow Remote Code Execution (2265906)

    Recommendation is updated

  * FID #10322 (MS10-071) Cumulative Security Update for Internet Explorer (2360131)

    Recommendation is updated

  * FID #10345 (MS10-071) Microsoft Internet Explorer Autocomplete Information Disclosure (2360131)

    Recommendation is updated

  * FID #10346 (MS10-071) Microsoft Internet Explorer toStaticHTML Information Disclosure (2360131) I

    Recommendation is updated

  * FID #10347 (MS10-071) Microsoft Internet Explorer toStaticHTML Information Disclosure (2360131) II

    Recommendation is updated

  * FID #10348 (MS10-071) Microsoft Internet Explorer CSS Special Character Information Disclosure (2360131)

    Recommendation is updated

  * FID #10349 (MS10-071) Microsoft Internet Explorer Uninitialized Memory Corruption Remote Code Execution (2360131) I

    Recommendation is updated

  * FID #10350 (MS10-071) Microsoft Internet Explorer Uninitialized Memory Corruption Remote Code Execution (2360131) II

    Recommendation is updated

  * FID #10351 (MS10-071) Microsoft Internet Explorer Anchor Element Information Disclosure (2360131)

    Recommendation is updated

  * FID #10352 (MS10-071) Microsoft Internet Explorer Uninitialized Memory Corruption Remote Code Execution (2360131) III

    Recommendation is updated

  * FID #10353 (MS10-071) Microsoft Internet Explorer Cross-Domain Information Disclosure (2360131)

    Recommendation is updated

  * FID #10354 (MS10-071) Microsoft Internet Explorer Uninitialized Memory Corruption (2360131) IV

    Recommendation is updated

  * FID #10618 Microsoft Internet Explorer Invalid Flag Remote Code Execution (2458511)

    Recommendation is updated

  * FID #10855 (MS10-090) Cumulative Security Update For Internet Explorer (2416400)

    Recommendation is updated

  * FID #10890 (MS10-090) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability CVE-2010-3340 (2416400)

    Recommendation is updated

  * FID #10892 (MS10-090) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability CVE-2010-3343 (2416400)

    Recommendation is updated

  * FID #10893 (MS10-090) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability CVE-2010-3345 (2416400)

    Recommendation is updated

  * FID #10894 (MS10-090) Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability CVE-2010-3346 (2416400)

    Recommendation is updated

  * FID #11249 (MS11-003) Microsoft Internet Explorer Uninitialized Memory Corruption I (2482017)

    Recommendation is updated

  * FID #11250 (MS11-003) Microsoft Internet Explorer Uninitialized Memory Corruption II (2482017)

    Recommendation is updated

  * FID #11267 (MS11-003) Cumulative Security Update For Internet Explorer (2482017)

    Recommendation is updated

  * FID #11580 (MS11-018) Microsoft Internet Explorer Object Management Memory Corruption (2497640)

    Recommendation is updated

  * FID #11754 (MS11-018) Cumulative Security Update For Internet Explorer (2497640)

    Recommendation is updated

  * FID #11787 (MS11-018) Microsoft Internet Explorer Layouts Handling Memory Corruption (2497640)

    Recommendation is updated

  * FID #11788 (MS11-018) Microsoft Internet Explorer MSHTML Memory Corruption (2497640)

    Recommendation is updated

  * FID #12215 (MS11-050) Cumulative Security Update for Internet Explorer (2530548)

    Recommendation is updated

  * FID #12219 (MS11-041) Microsoft Windows Kernel-Mode Drivers Could Allow Remote Code Execution (KB2525694)

    Recommendation is updated

  * FID #12221 (MS11-046) Microsoft Windows Ancillary Function Driver Could Allow Elevation Of Privilege (2503665)

    Recommendation is updated

  * FID #12233 (MS11-050) Microsoft Internet Explorer Link Properties Handling Memory Corruption (2530548)

    Recommendation is updated

  * FID #12234 (MS11-050) Microsoft Internet Explorer DOM Manipulation Memory Corruption (2530548)

    Recommendation is updated

  * FID #12236 (MS11-050) Microsoft Internet Explorer Drag and Drop Memory Corruption (2530548)

    Recommendation is updated

  * FID #12237 (MS11-050) Microsoft Internet Explorer Time Element Memory Corruption (2530548)

    Recommendation is updated

  * FID #12239 (MS11-050) Microsoft Internet Explorer DOM Modification Memory Corruption (2530548)

    Recommendation is updated

  * FID #12241 (MS11-050) Microsoft Internet Explorer Layout Memory Corruption (2530548)

    Recommendation is updated

  * FID #12242 (MS11-050) Microsoft Internet Explorer Selection Object Memory Corruption (2530548)

    Recommendation is updated

  * FID #12244 (MS11-050) Microsoft Internet Explorer HTTP Redirect Memory Corruption (2530548)

    Recommendation is updated

  * FID #12247 (MS11-041) Vulnerability In Windows Kernel-Mode Drivers Could Allow Remote Code Execution (KB2525694)

    Recommendation is updated

  * FID #12248 (MS11-046) Microsoft Windows Ancillary Function Driver Could Allow Elevation Of Privilege (2503665)

    Recommendation is updated

  * FID #12336 (MS11-054) Microsoft Windows Win32k Incorrect Parameter Privilege Escalation (2555917)

    Recommendation is updated

  * FID #12337 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference Privilege Escalation IV (2555917)

    Recommendation is updated

  * FID #12338 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference Privilege Escalation V (2555917)

    Recommendation is updated

  * FID #12449 (MS11-057) Microsoft Internet Explorer Style Object Memory Corruption Remote Code Execution (2559049)

    Recommendation is updated

  * FID #12450 (MS11-057) Microsoft Internet Explorer Telnet Handler Remote Code Execution (2559049)

    Recommendation is updated

  * FID #12451 (MS11-057) Microsoft Internet Explorer Windows Open Race Condition (2559049)

    Recommendation is updated

  * FID #12454 (MS11-057) Microsoft Internet Explorer XSLT Memory Corruption Remote Code Execution (2559049)

    Recommendation is updated

  * FID #12466 (MS11-057) Cumulative Security Update for Internet Explorer (2559049)

    Recommendation is updated

  * FID #4938 (MS07-012) Microsoft MFC Overrun Vulnerability (924667)

    Recommendation is updated

  * FID #5016 (MS07-033) Microsoft Internet Explorer 7 Navigation Cancel Page Spoofing Vulnerability (933566)

    Recommendation is updated

  * FID #5228 (MS07-033) Microsoft COM Object Instantiation Memory Corruption Vulnerability (933566)

    Recommendation is updated

  * FID #5229 (MS07-033) Microsoft CSS Tag Memory Corruption Vulnerability (933566)

    Recommendation is updated

  * FID #5321 (MS07-040) Microsoft .NET PE Loader Vulnerability (931212)

    Recommendation is updated

  * FID #5322 (MS07-040) Microsoft ASP.NET Null Byte Termination Vulnerability (931212)

    Recommendation is updated

  * FID #5323 (MS07-040) Microsoft .NET JIT Compiler Vulnerability (931212)

    Recommendation is updated

  * FID #5354 (MS07-057) Microsoft Internet Explorer Address Bar Spoofing Vulnerability III (939653)

    Recommendation is updated

  * FID #5415 (MS07-045) Microsoft Internet Explorer CSS Memory Corruption Vulnerability (937143)

    Recommendation is updated

  * FID #5416 (MS07-045) Microsoft Internet Explorer ActiveX Object Vulnerability (937143)

    Recommendation is updated

  * FID #5417 (MS07-045) Microsoft Internet Explorer ActiveX Object Memory Corruption Vulnerability (937143)

    Recommendation is updated

  * FID #5516 (MS07-057) Microsoft Internet Explorer Address Bar Spoofing Vulnerability I (939653)

    Recommendation is updated

  * FID #5520 (MS07-057) Microsoft Internet Explorer Address Bar Spoofing Vulnerability II (939653)

    Recommendation is updated

  * FID #5628 (MS07-069) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability I (942615)

    Recommendation is updated

  * FID #5629 (MS07-069) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability II (942615)

    Recommendation is updated

  * FID #5630 (MS07-069) Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability III(942615)

    Recommendation is updated

  * FID #5631 (MS07-069) Microsoft Internet Explorer DHTML Objects Memory Corruption Vulnerabilities (942615)

    Recommendation is updated

  * FID #5701 (MS08-010) Microsoft HTML Rendering Memory Corruption Vulnerability (944533)

    Recommendation is updated

  * FID #5702 (MS08-010) Microsoft Property Memory Corruption Vulnerability (944533)

    Recommendation is updated

  * FID #5703 (MS08-010) Microsoft Argument Handling Memory Corruption Vulnerability (944533)

    Recommendation is updated

  * FID #5704 (MS08-010) Microsoft ActiveX Object Memory Corruption Vulnerability (944533)

    Recommendation is updated

  * FID #5805 (MS08-025) Microsoft Windows Kernel Vulnerability (941693)

    Recommendation is updated

  * FID #5806 (MS08-024) Microsoft Data Stream Handling Memory Corruption Vulnerability (947864)

    Recommendation is updated

  * FID #5920 (MS08-031) Microsoft HTML Objects Memory Corruption Vulnerability (950759)

    Recommendation is updated

  * FID #5921 (MS08-031) Microsoft Request Header Cross-Domain Information Disclosure Vulnerability (950759)

    Recommendation is updated

  * FID #6052 (MS08-045) Microsoft HTML Objects Memory Corruption Vulnerability I (953838)

    Recommendation is updated

  * FID #6053 (MS08-045) Microsoft HTML Objects Memory Corruption Vulnerability II (953838)

    Recommendation is updated

  * FID #6054 (MS08-045) Microsoft Uninitialized Memory Corruption Vulnerability (953838)

    Recommendation is updated

  * FID #6055 (MS08-045) Microsoft HTML Objects Memory Corruption Vulnerability III (953838)

    Recommendation is updated

  * FID #6056 (MS08-045) Microsoft HTML Objects Memory Corruption Vulnerability IV (953838)

    Recommendation is updated

  * FID #6057 (MS08-045) Microsoft Component Handling Memory Corruption Vulnerability (953838)

    Recommendation is updated

  * FID #6161 (MS08-066) Microsoft AFD Kernel Overwrite Vulnerability (956803)

    Recommendation is updated

  * FID #6169 (MS08-061) Microsoft Windows Kernel Window Creation Vulnerability (954211)

    Recommendation is updated

  * FID #6170 (MS08-061) Microsoft Windows Kernel Unhandled Exception Vulnerability (954211)

    Recommendation is updated

  * FID #6171 (MS08-061) Microsoft Windows Kernel Memory Corruption Vulnerability (954211)

    Recommendation is updated

  * FID #6172 (MS08-058) Microsoft HTML Tag Element Cross-Domain Information Disclosure Vulnerability (956390)

    Recommendation is updated

  * FID #6173 (MS08-058) Microsoft Source Element Cross-Domain Information Disclosure Vulnerability (956390)

    Recommendation is updated

  * FID #6174 (MS08-058) Microsoft Window Location Property Cross-Domain Information Disclosure Vulnerability (956390)

    Recommendation is updated

  * FID #6175 (MS08-058) Microsoft Uninitialized Memory Corruption Vulnerability (956390)

    Recommendation is updated

  * FID #6176 (MS08-058) Microsoft HTML Objects Memory Corruption Vulnerability (956390)

    Recommendation is updated

  * FID #6177 (MS08-058) Microsoft Internet Explorer CPeerHolder::CPeerSite::QueryService() Vulnerability  (KB956390)

    Recommendation is updated

  * FID #6493 (MS09-006) Windows Kernel Handle Validation Vulnerability (958690)

    Recommendation is updated

  * FID #6494 (MS09-006) Windows Kernel Invalid Pointer Vulnerability (958690)

    Recommendation is updated

  * FID #6744 (MS09-019) Microsoft Internet Explorer Cross-Domain Information Disclosure Vulnerability (969897)

    Recommendation is updated

  * FID #6750 (MS09-019) Microsoft Internet Explorer Race Condition Cross-Domain Information Disclosure Vulnerability (969897)

    Recommendation is updated

  * FID #6766 (MS09-025) Microsoft Windows Desktop Parameter Edit Vulnerability (968537)

    Recommendation is updated

  * FID #6767 (MS09-025) Microsoft Windows Driver Class Registration Vulnerability (968537)

    Recommendation is updated

  * FID #6768 (MS09-025) Microsoft Windows Kernel Desktop Vulnerability (968537)

    Recommendation is updated

  * FID #6769 (MS09-025) Microsoft Windows Kernel Pointer Validation Vulnerability (968537)

    Recommendation is updated

  * FID #7210 (MS09-061) Silverlight and Microsoft .NET Framework CLR Vulnerability (974378)

    Recommendation is updated

  * FID #7544 (MS09-025) Vulnerabilities In Windows Kernel Could Allow Elevation of Privilege (968537)

    Recommendation is updated

  * FID #7723 (MS10-002) Microsoft Internet Explorer XSS Filter Script Handling Vulnerability (978207)

    Recommendation is updated

  * FID #7732 (MS08-025) Vulnerability In Windows Kernel Could Allow Elevation Of Privilege (941693)

    Recommendation is updated

  * FID #8020 (MS08-058) Cumulative Security Update For Internet Explorer (956390)

    Recommendation is updated

  * FID #8132 (MS08-066) Vulnerability In The Microsoft Ancillary Function Driver Could Allow Elevation Of Privilege (956803)

    Recommendation is updated

  * FID #8327 (MS10-018) Microsoft Internet Explorer HTML Element Cross-Domain Vulnerability (980182)

    Recommendation is updated

  * FID #8331 (MS10-018) Microsoft Internet Explorer Post Encoding Information Disclosure Vulnerability (980182)

    Recommendation is updated

  * FID #9063 (MS10-032) Vulnerabilities In Windows Kernel-Mode Drivers Could Allow Remote Code Execution (979559)

    Recommendation is updated

  * FID #9069 (MS10-041) Vulnerabilities In The Microsoft .NET Framework Could Allow Tampering (981343)

    Recommendation is updated

  * FID #9073 (MS10-032) Microsoft Windows Win32k Improper Data Validation Vulnerability (979559)

    Recommendation is updated

  * FID #9074 (MS10-032) Microsoft Windows Win32k Window Creation Vulnerability (979559)

    Recommendation is updated

  * FID #9075 (MS10-032) Microsoft Windows Win32k TrueType Font Parsing Vulnerability (979559)

    Recommendation is updated

  * FID #9077 (MS10-035) Microsoft Internet Explorer toStaticHTML Information Disclosure Vulnerability (982381)

    Recommendation is updated

  * FID #9086 (MS10-041) Microsoft Windows .NET Framework XML Signature HMAC Truncation Bypass Vulnerability (981343)

    Recommendation is updated

  * FID #9722 (MS10-048) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329)

    Recommendation is updated

  * FID #10104 (MS10-070) Microsoft ASP.NET AES Decrypt Security Bypass (2416728)

    Recommendation is updated

  * FID #10168 (MS10-070) Microsoft ASP.NET AES Decrypt Security Bypass (2416728)

    Recommendation is updated

  * FID #10199 (MS10-070) Vulnerability in ASP.NET Could Allow Information Disclosure (2418042)

    Recommendation is updated

  * FID #10358 (MS10-073) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957)

    Recommendation is updated

  * FID #10360 (MS10-073) Microsoft Windows Win32K Reference Count Privilege Escalation (981957)

    Recommendation is updated

  * FID #10361 (MS10-073) Microsoft Windows Win32K Keyboard Layout Privilege Escalation (981957)

    Recommendation is updated

  * FID #10362 (MS10-073) Microsoft Windows Win32k Window Class Privilege Escalation (981957)

    Recommendation is updated

  * FID #10869 (MS10-098) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2436673)

    Recommendation is updated

  * FID #10891 (MS10-090) Microsoft Internet Explorer Cross-Domain Information Disclosure Vulnerability CVE-2010-3342 (2416400)

    Recommendation is updated

  * FID #10895 (MS10-090) Microsoft Internet Explorer Cross-Domain Information Disclosure Vulnerability CVE-2010-3348 (2416400)

    Recommendation is updated

  * FID #10898 (MS10-098) Microsoft Windows Win32k Buffer Overflow Could Allow Elevation Of Privilege (2436673)

    Recommendation is updated

  * FID #10899 (MS10-098) Microsoft Windows Win32k Buffer Overflow Could Allow Elevation Of Privilege CVE-2010-3940 (2436673)

    Recommendation is updated

  * FID #10900 (MS10-098) Microsoft Windows Win32k Double Free Could Allow Elevation Of Privilege (2436673)

    Recommendation is updated

  * FID #10901 (MS10-098) Microsoft Windows Win32k WriteAV Could Allow Elevation Of Privilege (2436673)

    Recommendation is updated

  * FID #10902 (MS10-098) Microsoft Windows Win32k Cursor Linking Could Allow Elevation Of Privilege (2436673)

    Recommendation is updated

  * FID #10903 (MS10-098) Microsoft Windows Win32k Memory Corruption Could Allow Elevation Of Privilege (2436673)

    Recommendation is updated

  * FID #11244 (MS11-012) Microsoft Win32k Improper User Input Validation (2479628)

    Recommendation is updated

  * FID #11245 (MS11-012) Microsoft Win32k Insufficient User Input Validation (2479628)

    Recommendation is updated

  * FID #11246 (MS11-012) Microsoft Win32k Window Class Pointer Confusion (2479628)

    Recommendation is updated

  * FID #11247 (MS11-012) Microsoft Win32k Window Class Improper Pointer Validation (2479628)

    Recommendation is updated

  * FID #11248 (MS11-012) Microsoft Win32k Memory Corruption (2479628)

    Recommendation is updated

  * FID #11251 (MS11-003) Microsoft Internet Explorer Insecure Library Loading (2482017)

    Recommendation is updated

  * FID #11266 (MS11-012) Vulnerabilities In Windows Kernel-Mode Drivers Could Allow Elevation Of Privilege (2479628)

    Recommendation is updated

  * FID #11770 (MS11-034) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2506223)

    Recommendation is updated

  * FID #11789 (MS11-018) Microsoft Internet Explorer Frame Tag Information Disclosure (2497640)

    Recommendation is updated

  * FID #11791 (MS11-034) Microsoft Win32k Use After Free I (2506223)

    Recommendation is updated

  * FID #11792 (MS11-034) Microsoft Win32k Use After Free II (2506223)

    Recommendation is updated

  * FID #11793 (MS11-034) Microsoft Win32k Use After Free III (2506223)

    Recommendation is updated

  * FID #11794 (MS11-034) Microsoft Win32k Use After Free IV (2506223)

    Recommendation is updated

  * FID #11795 (MS11-034) Microsoft Win32k Use After Free V (2506223)

    Recommendation is updated

  * FID #11796 (MS11-034) Microsoft Win32k Use After Free VI (2506223)

    Recommendation is updated

  * FID #11797 (MS11-034) Microsoft Win32k Use After Free VII (2506223)

    Recommendation is updated

  * FID #11798 (MS11-034) Microsoft Win32k Use After Free VIII (2506223)

    Recommendation is updated

  * FID #11799 (MS11-034) Microsoft Win32k Use After Free IX (2506223)

    Recommendation is updated

  * FID #11800 (MS11-034) Microsoft Win32k Use After Free X (2506223)

    Recommendation is updated

  * FID #11801 (MS11-034) Microsoft Win32k Use After Free XI (2506223)

    Recommendation is updated

  * FID #11802 (MS11-034) Microsoft Win32k Use After Free XII (2506223)

    Recommendation is updated

  * FID #11803 (MS11-034) Microsoft Win32k Use After Free XIII (2506223)

    Recommendation is updated

  * FID #11804 (MS11-034) Microsoft Win32k Use After Free XIV (2506223)

    Recommendation is updated

  * FID #11805 (MS11-034) Microsoft Win32k Use After Free XV (2506223)

    Recommendation is updated

  * FID #11806 (MS11-034) Microsoft Win32k Use After Free XVI (2506223)

    Recommendation is updated

  * FID #11807 (MS11-034) Microsoft Win32k Use After Free XVII (2506223)

    Recommendation is updated

  * FID #11808 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation I (2506223)

    Recommendation is updated

  * FID #11809 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation II (2506223)

    Recommendation is updated

  * FID #11810 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation III (2506223)

    Recommendation is updated

  * FID #11811 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation IV (2506223)

    Recommendation is updated

  * FID #11812 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation V (2506223)

    Recommendation is updated

  * FID #11813 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation VI (2506223)

    Recommendation is updated

  * FID #11814 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation VII (2506223)

    Recommendation is updated

  * FID #11815 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation VIII (2506223)

    Recommendation is updated

  * FID #11816 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation IX (2506223)

    Recommendation is updated

  * FID #11817 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation X (2506223)

    Recommendation is updated

  * FID #11818 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation XI (2506223)

    Recommendation is updated

  * FID #11819 (MS11-034) Microsoft Win32k Null Pointer Dereference Privilege Escalation XII (2506223)

    Recommendation is updated

  * FID #11828 (MS11-018) Microsoft Internet Explorer Javascript Information Disclosure (2497640)

    Recommendation is updated

  * FID #11836 (MS11-034) Microsoft Win32k Use After Free XVIII (2506223)

    Recommendation is updated

  * FID #12232 (MS11-050) Microsoft Internet Explorer MIME Sniffing Information Disclosure (2530548)

    Recommendation is updated

  * FID #12235 (MS11-050) Microsoft Internet Explorer toStaticHTML Information Disclosure (2530548)

    Recommendation is updated

  * FID #12240 (MS11-050) Microsoft Internet Explorer Drag and Drop Information Disclosure (2530548)

    Recommendation is updated

  * FID #12324 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation I (2555917)

    Recommendation is updated

  * FID #12325 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation II (2555917)

    Recommendation is updated

  * FID #12326 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation III (2555917)

    Recommendation is updated

  * FID #12327 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation IV (2555917)

    Recommendation is updated

  * FID #12328 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation V (2555917)

    Recommendation is updated

  * FID #12329 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation VI (2555917)

    Recommendation is updated

  * FID #12330 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference  Privilege Escalation I (2555917)

    Recommendation is updated

  * FID #12331 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference  Privilege Escalation II (2555917)

    Recommendation is updated

  * FID #12332 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation VII (2555917)

    Recommendation is updated

  * FID #12333 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation VIII (2555917)

    Recommendation is updated

  * FID #12334 (MS11-054) Microsoft Windows Win32k Use After Free Privilege Escalation IX (2555917)

    Recommendation is updated

  * FID #12335 (MS11-054) Microsoft Windows Win32k Null Pointer Dereference  Privilege Escalation III (2555917)

    Recommendation is updated

  * FID #12446 (MS11-057) Microsoft Internet Explorer Event Handlers Information Disclosure (2559049)

    Recommendation is updated

  * FID #12448 (MS11-057) Microsoft Internet Explorer Shift JIS Character Encoding Information Disclosure (2559049)

    Recommendation is updated

  * FID #30043 Sun Solaris 112921-10 Update Is Not Installed

    Name is updated

    Description is updated

    Observation is updated

    Recommendation is updated

    CVE is updated

    FASLScript is updated

  * FID #30867 Sun Solaris 116046-10 Update Is Not Installed

    Name is updated

    Description is updated

    Observation is updated

    Recommendation is updated

    CVE is updated

    FASLScript is updated

  * FID #12342 (MS11-054) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917)

    Recommendation is updated

  * FID #12447 (MS11-057) Microsoft Internet Explorer Drag And Drop Information Disclosure (2559049)

    Recommendation is updated

  * FID #94825 SuSE SLES 10 SP3 MozillaFirefox-7783 Update Is Not Installed

    FASLScript is updated

  * FID #877 Microsoft IIS Authentication Enumeration

    FASLScript is updated

 

削除されたチェック項目:

 

  * FID #30044 Sun Solaris 112922-02 Update Is Not Installed

 

-------------------------------------------------------

2) アプライアンス OSパッチアップデート

-------------------------------------------------------

 期間: 2011/10/12 ~ 2011/10/17 (日本時間)

 

今回のアップデートはございません。

 

-------------------------------------------------------

3) McAfee Vulnerability Manager Software v6.8のサポート終了について

-------------------------------------------------------

McAfee Vulnerability Manager Softwareにつきまして、以下のバージョンの

サポート終了を予定しておりますのでご案内いたします。

 

McAfee Vulnerability Manager Software v6.8

サポート終了日:2012年6月30日

 

■備考

・現在の最新バージョンは、McAfee Vulnerability Manager Software v7.0です。

・本バージョンへの移行などに関しましては、弊社サポート窓口までお問い合わせください。

・ソフトウェアンおよびドキュメントは下記ダウンロードページよりご入手いただけます。

 http://www.mcafee.com/japan/licensed2/

 

-------------------------------------------------------

4) サポートコミュニティサイトでのテクニカルドキュメント公開

-------------------------------------------------------

サポートコミュニティサイト「Japan Corporate Support」にVulnerability Manager

に関する下記のテクニカルドキュメントを公開いたしましたので、是非ご覧ください。

 

i) Vulnerability Manager v6.8(MVM3100)評価ガイド

     MVM3100をはじめて利用される方向けの簡易評価ガイドです。

 

ii) VulnerabilityManager(MVM3100)評価機初期化マニュアル

     MVM3100を初期化する際のマニュアルです。

 

■備考

・評価機のご利用につきましては弊社営業までお問合わせください。

・ダウンロード方法

 サポート・コミュニティ・サイト https://community.mcafee.com/community/japan

 にて、「ドキュメント」タブ をクリック、「カテゴリーとタグによる絞り込み」を

 クリックし「Vulnerability Manager」をクリックしてください。

 画面下部に上記2ドキュメントが表示されます。

 

-------------------------------------------------------

5) 企業向けサポートコミュニティサイトの開設および Twitter サービスの開始について

-------------------------------------------------------

○ お知らせ

 

企業向けサポートコミュニティサイト「Japan Corporate Support」を開設いたしました。

また、「企業向けお客様サポート公式 Twitter」を開設し、サポート情報のリアルタイム

配信を開始しました。

 

マカフィー、ユーザー参加型の企業向け製品コミュニティサイトをオープン

~サポート部門が主体となり企業セキュリティに関するディスカッションの場を提供~

(4月18日発プレスリリース)

http://www.mcafee.com/japan/about/prelease/pr_11a.asp?pr=11/04/18-1

 

● 開始日

 

2011/04/18 (月) 9:00

 

○ 備考

 

- 企業向けサポートコミュニティサイト「Japan Corporate Support」

   https://community.mcafee.com/community/japan

   サポート通信や FAQ 掲載情報、製品及びパッチのリリース情報やドキュメントが掲載

   されます。また、製品に関する技術的な情報に関して、コミュニティご登録者が参加

   可能なフリーディスカッションのスペースがございます。

 

- 企業向けお客様サポート公式 Twitter

   http://twitter.com/McAfee_BTS_JP

   Twitter サービスを利用し、サポート通信や FAQ 掲載情報、製品及びパッチのリリー

   ス情報がリアルタイムで配信されます。

 

  コミュニティサイトの登録方法、 Twitter のフォロー方法などの詳細につきましては、

  以下のページをご覧ください。

  http://www.mcafee.com/Japan/support/japancorporate.asp

 

-------------------------------------------------------

6) 「サポート通信」配信について

-------------------------------------------------------

 

新規契約をしたお客様には、4種類のサポート通信を配信いたします。

各種サポート通信が不要な方は、各サポート通信の文末に記載されているURLにアクセスして、

解除手続きを行っていただきます。

 

障害などでサポート窓口にお問い合わせいただいた新規のご担当者様には、

今までどおり、「サポート通信 - 登録のご案内」メールを1回のみ配信いたします。

http://www.mcafee.com/japan/support/customer_support/techsupport_regform.asp

 

---------------------------------------------------------

※ マカフィーからのサービス

---------------------------------------------------------

● マカフィーモバイルサービス

  携帯電話を利用して、緊急ウイルス情報をリアルタイムに確認し、

  ウイルス被害を抑制できます。

   ⇔ http://www.mcafee.com/japan/support/mobileservice.asp

 

○ サポートQ&A

- 製品の評価、導入、トラブル、障害の発生時に参考となる解決策や

   回避策のFAQをご確認頂けます。 是非お役立て下さい。

   ⇔ http://www.mcafee.com/japan/pqa/pqa.asp

- 1週間のあいだに更新(あるいは新掲載)されたQ&Aはこちら

   ⇔ http://www.mcafee.com/japan/pqa/pqa_newqa.asp

 

● 企業向けサポートコミュニティサイト「Japan Corporate Support」

   https://community.mcafee.com/community/japan

   サポート通信や FAQ 掲載情報、製品及びパッチのリリース情報やドキュメントが掲載

   されます。また、製品に関する技術的な情報に関して、コミュニティご登録者が

   参加可能なフリーディスカッションのスペースがございます。

 

○ 企業向けお客様サポート公式 Twitter

   http://twitter.com/McAfee_BTS_JP

   Twitter サービスを利用し、サポート通信や FAQ 掲載情報、製品及びパッチのリリース

   情報がリアルタイムで配信されます。

 

● マカフィーサポート通信について

- 配信停止

  「マカフィー サポート通信 - リスク管理ソリューション 」の配信停止をご希望される方は、

  以下のページより手続きをお願い致します。

 https://md.pbz.jp/s/r-ctrl.php?act=PCDelAuth&funcinfo_allreset=1&uid=mcafee&mid= foundstone_supp

- 各種法人ユーザ登録情報の変更はこちら

   ⇔ http://www.mcafee.com/japan/support/customer_support/tourokuhenkou.asp

 

●===McAfee=============================================○

発信元:

マカフィー株式会社

テクニカルサポートセンター インフォメーション係

http://www.mcafee.com/japan/support/customer_support/

(c) 2011 McAfee, Inc. All Rights Reserved.

お客様は,マカフィー株式会社の事前の書面による承諾を得ることなく、

掲載内容の無断転載を禁じます。

○=============================================McAfee===●