List of “Vulnerability”

  • How to Describe Vulnerability Information? Vulnerability
    How to Describe Vulnerability Information?
    Today, I would like to introduce an activity at the Vulnerability Coordination Group of JPCERT/CC.It is a method to describe a vulnerability using Vulnerability Description Ontology (VDO). JPCERT/CC receives software vulnerability information from domestic and overseas reporters, then coordinates them in between the vendor/developer and the reporter. While there is a vulnerability reporting template, vulnerability itself is described in a free format. Reporter can describe about a vulnerability in a...

    Read more

  • JPCERT/CC Publishes "Vulnerability Coordination and Disclosure Policy" Vulnerability
    JPCERT/CC Publishes "Vulnerability Coordination and Disclosure Policy"
    JPCERT/CC has been coordinating and disclosing software vulnerabilities under the "Information Security Early Warning Partnership" since 2004. We have coordinated and disclosed over 1,500 vulnerabilities with developers as of the end of 2017. The "Information Security Early Warning Partnership" has a guideline that serves as a framework for how vulnerabilities are coordinated within Japan. An overview of the framework including how reported vulnerabilities are coordinated and disclosed is provided at...

    Read more

  • Anti-analysis technique for PE Analysis Tools –INT Spoofing– Vulnerability
    Anti-analysis technique for PE Analysis Tools –INT Spoofing–
    When analysing Windows executable file type (PE file) malware, a tool to parse and display the PE file’s structure (hereafter “PE analysis tool”) is often used. This tool enables referring to a list of APIs that the malware imports (Import API) and functions that it exports. By analysing the data, it is possible to presume the malware’s function as in communicating with external servers or creating registry entries, etc. In...

    Read more

  • Japan Vulnerability Notes (JVN) Site Update Vulnerability
    Japan Vulnerability Notes (JVN) Site Update
    Hello, Taki here. This is more of an update to my previous entry: Some coordinated vulnerability disclosures in April 2016 https://blogs.jpcert.or.jp/en/2016/05/some-coordinated-vulnerability-disclosures-in-april-2016.html Towards the end of the entry, I had mentioned that we were working on upgrading our systems to get more advisories out on our JVN English site. As of May 16th, the JVN site has been updated so that we can release advisories for vulnerability reports that are directly...

    Read more

  • Some coordinated vulnerability disclosures in April 2016 Vulnerability
    Some coordinated vulnerability disclosures in April 2016
    Hello, Taki here. It has been a long time since I have written here. Today, I will be writing about some activities within our Vulnerability Coordination Group. Over the past few years, we have received some coordination requests directly from overseas researchers and other sources, in addition to the reports through the " Information Security Early Warning Partnership". I would like to introduce some recent cases that we have published...

    Read more

  • Fiddler Core's insecure Default flag may lead to Open Proxy Issue Vulnerability
    Fiddler Core's insecure Default flag may lead to Open Proxy Issue
    NOTE: This article, originally published on May 28, 2015, was updated as of June 8, 2015 (See below). Just 2 days ago, we published an advisory (in Japanese) on an open proxy issue of a widely used, open source, web browser game utility app called KanColleViewer. The game, Kantai Collection, has explosive popularity. Its official Twitter account has over 1 million followers, and according to its Tweet, the game has...

    Read more

  • Increase in Possible Scan Activity from NAS Devices Malware
    Increase in Possible Scan Activity from NAS Devices
    Happy holidays to all, this is Tetsuya from Watch and Warning Group. Today, I would like to share a recent, remarkable trend discovered through TSUBAME sensors. In TSUBAME, we have observed a significant increase in packets destined to 8080/TCP since December 5th, 2014. When accessing source IP addresses using a web browser, the admin login screen for NAS devices provided by QNAP was seen in many cases for IP addresses...

    Read more

  • Year in Review - Vulnerability Handling and Changing with the Times Vulnerability
    Year in Review - Vulnerability Handling and Changing with the Times
    Hello and Happy Holiday Season to everybody. Taki again, and today I will write about some experiences in product (software, hardware) vulnerability coordination this year. - Introduction - A lot happened this year and I do not have the time to go through everything, but would like to go over some of the major issues that we handled and for those that are not familiar, provide a very brief overview...

    Read more

  • The Heartbleed bug - How Japanese Organizations confront the issue - Vulnerability
    The Heartbleed bug - How Japanese Organizations confront the issue -
    Hi. This is Misaki Kimura from Watch and Warning Group. Ever since the extremely critical vulnerability in recent versions of OpenSSL (known as "Heartbleed") was made public, it has been wreaking havoc across the internet. According to Netcraft, a research firm which monitors websites and certificates worldwide, more than half a million websites were affected. Such said, with no exceptions, websites in Japan were also affected, and we have been...

    Read more

  • Source Port Randomization for Caching DNS Servers Requested, yet again. Vulnerability
    Source Port Randomization for Caching DNS Servers Requested, yet again.
    Hello, this is Moto Kawasaki, a new member of Global Coordination Division. Alerts from JPRS and JPCERT/CC On April 14th 2014, JPRS (Japan Registry Services Co., Ltd.) and JPCERT/CC concurrently published the alerts on DNS cache poisoning attack. Alert from JPRS http://jprs.jp/tech/security/2014-04-15-portrandomization.html (Japanese version) Alert from JPCERT/CC https://www.jpcert.or.jp/english/at/2014/at140016.html (English version) https://www.jpcert.or.jp/at/2014/at140016.html (Japanese version) Now I'd like to elaborate on the key points and share my views on the case by...

    Read more