Front Row アップデート2.1.6がソフトウェア・アップデート経由で出ています。
Front Row アップデート 2.1.6 13.1 MB
この Front Row アップデートでは、iTunes 8.0 との互換性が向上され、複数の問題が修正されています。
Front Row アップデート 2.1.6 13.1 MB
この Front Row アップデートでは、iTunes 8.0 との互換性が向上され、複数の問題が修正されています。
APPLE-SA-2008-09-09 iPod touch v2.1
iPod touch v2.1 is now available and addresses the following issues:
Application Sandbox
CVE-ID: CVE-2008-3631
Available for: iPod touch v2.0 through v2.0.2
Impact: An application may be able to read another application's files
Description: The Application Sandbox does not properly enforce access restrictions between third-party applications. This may allow a third-party application to read files in another third-party application's sandbox and lead to the disclosure of sensitive information. This update addresses the issue by enforcing the proper access restrictions between application sandboxes. Credit to Nicolas Seriot of Sen:te and Bryce Cogswell for reporting this issue. This issue does not affect iPod touch versions prior to v2.0.
CoreGraphics
CVE-ID: CVE-2008-1806, CVE-2008-1807, CVE-2008-1808
Available for: iPod touch v1.1 through v2.0.2
Impact: Multiple vulnerabilities in FreeType v2.3.5
Description: Multiple vulnerabilities exist in FreeType v2.3.5, the most serious of which may lead to arbitrary code execution when accessing maliciously crafted font data. This update addresses the issue by incorporating the security fixes from version 2.3.6 of FreeType. Further information is available via the FreeType site at http://www.freetype.org/
mDNSResponder
CVE-ID: CVE-2008-1447
Available for: iPod touch v1.1 through v2.0.2
Impact: mDNSResponder is susceptible to DNS cache poisoning and may return forged information
Description: mDNSResponder provides translation between host names and IP addresses for applications that use its unicast DNS resolution API. A weakness in the DNS protocol may allow a remote attacker to perform DNS cache poisoning attacks. As a result, applications that rely on mDNSResponder for DNS may receive forged information. This update addresses the issue by implementing source port and transaction ID randomization to improve resilience against cache poisoning attacks. Credit to Dan Kaminsky of IOActive for reporting this issue.
Networking
CVE-ID: CVE-2008-3612
Available for: iPod touch v2.0 through v2.0.2
Impact: Predictable TCP initial sequence numbers generation may lead to TCP spoofing or session hijacking
Description: TCP initial sequence numbers are sequentially generated. Predictable initial sequence numbers may allow a remote attacker to create a spoofed TCP connection or insert data into an existing TCP connection. This update addresses the issue by generating random TCP initial sequence numbers. This issue does not affect iPod touch versions prior to v2.0.
WebKit
CVE-ID: CVE-2008-3632
Available for: iPod touch v1.1 through v2.0.2
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A use-after-free issue exists in WebKit's handling of CSS import statements. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved handling of document references.
Installation note:
This update is only available through iTunes, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an internet connection and have installed the latest version of iTunes from www.apple.com/itunes/
iTunes will automatically check Apple's update server on its weekly schedule. When an update is detected, it will download it. When the iPod touch is docked, iTunes will present the user with the option to install the update. We recommend applying the update immediately if possible. Selecting "don't install" will present the option the next time you connect your iPod touch.
The automatic update process may take up to a week depending on the day that iTunes checks for updates. You may manually obtain the update via the "Check for Update" button within iTunes. After doing this, the update can be applied when your iPod touch is docked to your computer.
To check that the iPod touch has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update will be "2.1 (5F135)" or later
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
APPLE-SA-2009-09-09 Bonjour for Windows 1.0.5
Bonjour for Windows 1.0.5 is now available and addresses the following issues:
mDNSResponder
CVE-ID: CVE-2008-2326
Available for: Windows Vista, XP SP2 and SP3, 2003, 2000
Impact: Resolving a maliciously crafted ".local" domain name may cause an unexpected application termination
Description: A null pointer dereference issue exists in the Bonjour Namespace Provider. Resolving a maliciously crafted ".local" domain name containing a long DNS label may cause an unexpected application termination. This update addresses the issue by performing additional validation of DNS labels. This issue does not affect systems running Mac OS X. Credit to Mario Ballano of 48bits.com for reporting this issue.
mDNSResponder
CVE-ID: CVE-2008-3630
Available for: Windows Vista, XP SP2 and SP3, 2003, 2000
Impact: mDNSResponder may return forged information for unicast DNS queries
Description: Bonjour for Windows provides Zero Configuration Networking, Multicast DNS, and Network Service Discovery for Windows users. It's also possible to use the Bonjour API to issue conventional unicast DNS queries. A weakness in the DNS protocol may allow a remote attacker to spoof DNS responses. As a result, if there are applications that use Bonjour for Windows for unicast DNS, those applications may receive forged information. However, there are no known applications that use the Bonjour APIs for unicast DNS hostname resolution. This update addresses the issue by implementing source port and transaction ID randomization to improve resilience against spoofing attacks. This change does not affect Multicast DNS resolution.
Bonjour for Windows 1.0.5 is included in iTunes 8.0.
Bonjour for Windows 1.0.5 may be obtained from
Apple's Software Downloads web site:
http://www.apple.com/support/downloads/
The download file is named: "BonjourSetup.exe"
Its SHA-1 digest is: 681e3505bb9d7780c200e5a5eba43e8ba7062c05
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
iTunes 8.0 58.4 MB以下、Apple Product Securityからのメールを引用。
iTunes 8 には、ライブラリの中から同じテイストの曲を自動的に選択してプレイリストを作成する Genius 機能が含まれています。また、Genius 機能の一部である Genius サイドバーでは、iTunes Store の中からまだお持ちでない曲をお勧めします。
iTunes 8 を使って、新しいグリッド表示でアーティストとアルバムをブラウズしましょう。iTunes Store からお気に入りのテレビ番組を HD 品質でダウンロードしましょう。メディアを iPod nano(第四世代)、iPod classic(120 GB)、および iPod touch(第二世代)と同期しましょう。そして、魅力あふれる新しいミュージックビジュアライザを楽しみましょう。
iTunes 8 および iTunes U は、お使いの Mac 上で VoiceOver を使ってアクセスできるようになりました。
このアップデートのセキュリティに関する内容について詳しくは、次の Web サイトにアクセスしてください:http://support.apple.com/kb/HT1222?viewlocale=ja_JP
APPLE-SA-2009-09-09 iTunes 8.0
iTunes 8.0 is now available and addresses the following issues:
iTunes
CVE-ID: CVE-2008-3634
Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11
Impact: Firewall warning dialog in iTunes is misleading
Description: When the firewall is configured to block iTunes Music Sharing and the user enables iTunes Music Sharing in iTunes, a warning dialog is displayed which incorrectly informs the user that unblocking iTunes Music Sharing doesn't affect the firewall's security. Allowing iTunes Music Sharing or any other service through the firewall inherently affects security by exposing the service to remote entities. This update addresses the issue by refining the text in the warning dialog. This issue does not affect systems running Mac OS X v10.5 or later. Credit info to Eric Hall of DarkArt Consulting Services, Inc. for reporting this issue.
iTunes
CVE-ID: CVE-2008-3636
Available for: Windows XP or Vista
Impact: A local user may gain system privileges
Description: A third-party driver provided with iTunes may trigger an integer overflow, and could allow a local user to obtain system privileges. Credit to Ruben Santamarta of Wintercore for reporting this issue.
iTunes 8.0 may be obtained from: http://www.apple.com/itunes/download/
For Mac OS X:
The download file is named: "iTunes8.dmg"
Its SHA-1 digest is: af54727e4b2e0e6bb0c367b34ae5075f36096aef
For Windows XP / Vista:
The download file is named: "iTunes8Setup.exe"
Its SHA-1 digest is: 5d4ff8ffbe9feeaed67deb317797c1d71a03c359
For Windows XP / Vista 64 Bit:
The download file is named: "iTunes864Setup.exe"
Its SHA-1 digest is: 86df5d9899a8dad82b893309dc18672e3d2cccd0
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
QuickTime 7.5.5 67.5 MB以下、Apple Product Securityからのメールを引用。
QuickTime 7.5.5 では、信頼性の改善、アプリケーションの互換性の向上、およびセキュリティの改善を実現する変更が加えられています。
すべての QuickTime 7 ユーザの方にこのリリースを推奨します。
このアップデートのセキュリティ関連の内容について詳しくは、次の Web サイトを参照してください:http://www.info.apple.com/kbnum/n61798-ja
APPLE-SA-2008-09-09 QuickTime 7.5.5
QuickTime 7.5.5 is now available and addresses the following issues:
QuickTime
CVE-ID: CVE-2008-3615
Available for: Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: An uninitialized memory access issue exists in the third-party Indeo v5 codec for QuickTime, which does not ship with QuickTime. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by not rendering content encoded with any version of the Indeo codec. This issue does not affect systems running Mac OS X. Credit to Paul Byrne of NGSSoftware for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3635
Available for: Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: A stack buffer overflow exists in the third-party Indeo v3.2 codec for QuickTime. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by not rendering content encoded with any version of the Indeo codec. This issue does not affect systems running Mac OS X. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3624
Available for: Mac OS X v10.4.9 - v10.4.11, Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution
Description: A heap buffer overflow exists in QuickTime's handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking of panorama atoms. Credit to Roee Hay of IBM Rational Application Security Research Group for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3625
Available for: Mac OS X v10.4.9 - v10.4.11, Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted QTVR movie file may lead to an unexpected application termination or arbitrary code execution
Description: A stack buffer overflow exists in QuickTime's handling of panorama atoms in QTVR (QuickTime Virtual Reality) movie files. Viewing a maliciously crafted QTVR file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking of panorama atoms. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3614
Available for: Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution
Description: An integer overflow exists in QuickTime's handling of PICT images. Opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of PICT images. Credit to an anonymous researcher working with the iDefense VCP for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3626
Available for: Mac OS X v10.4.9 - v10.4.11, Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue exists in QuickTime's handling of STSZ atoms in movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking of STSZ atoms. Credit to an anonymous researcher working with TippingPoint's Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3627
Available for: Mac OS X v10.4.9 - v10.4.11, Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption exist in QuickTime's handling of H.264 encoded movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of H.264 encoded movie files. Credit to an anonymous researcher and Subreption LLC working with TippingPoint's Zero Day Initiative for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3628
Available for: Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution
Description: An invalid pointer issue exists in QuickTime's handling of PICT images. Opening a maliciously crafted PICT image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by correctly saving and restoring a global variable. This issue does not affect systems running Mac OS X. Credit to David Wharton for reporting this issue.
QuickTime
CVE-ID: CVE-2008-3629
Available for: Mac OS X v10.4.9 - v10.4.11, Mac OS X v10.5 or later, Windows Vista, XP SP2 and SP3
Impact: Opening a maliciously crafted PICT image may lead to an unexpected application termination
Description: An out-of-bounds read issue exists in QuickTime's handling of PICT images. Opening a maliciously crafted PICT image may lead to an unexpected application termination. This update addresses the issue by performing additional validation of PICT images. Credit to Sergio 'shadown' Alvarez of n.runs AG for reporting this issue.
QuickTime 7.5.5 may be obtained from the Software Update application, or from the QuickTime Downloads site: http://www.apple.com/quicktime/download/
For Mac OS X v10.5 or later
The download file is named: "QuickTime755_Leopard.dmg"
Its SHA-1 digest is: 934f784a553c2d4484d298071ad6d95ea34b8b2f
For Mac OS X v10.4.9 through Mac OS X v10.4.11
The download file is named: "QuickTime755_Tiger.dmg"
Its SHA-1 digest is: dcdf58e27aad2a1e958788c0f58584605c4b8e78
For Windows Vista / XP SP2 and SP3
The download file is named: "QuickTimeInstaller.exe"
Its SHA-1 digest is: 5900ff0b8044972cb06b52dfc913c6364bf27ccc
QuickTime with iTunes for Windows XP or Vista
The download file is named: iTunes8Setup.exe
Its SHA-1 digest is: 5d4ff8ffbe9feeaed67deb317797c1d71a03c359
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
ICカードの SFによる バス運賃 支払額 | バスポイント合計 | 特典バスポイント | 運賃利用額 | |
---|---|---|---|---|
付与チケット | チケット累計 | |||
1,000円 | 1,000ポイント | 100円分 | 100円分 | 1,100円 |
2,000円 | 2,000ポイント | 100円分 | 200円分 | 2,200円 |
3,000円 | 3,000ポイント | 100円分 | 300円分 | 3,300円 |
4,000円 | 4,000ポイント | 100円分 | 400円分 | 4,400円 |
5,000円 | 5,000ポイント | 450円分 | 850円分 | 5,850円 |
6,000円 | 6,000ポイント | 170円分 | 1,020円分 | 7,020円 |
7,000円 | 7,000ポイント | 170円分 | 1,190円分 | 8,190円 |
8,000円 | 8,000ポイント | 170円分 | 1,360円分 | 9,360円 |
9,000円 | 9,000ポイント | 170円分 | 1,530円分 | 10,530円 |
10,000円 | 10,000ポイント | 170円分 | 1,700円分 | 11,700円 |
居室です | 居室向かいの実験室 | その実験室内 |
冷凍庫専用の部屋 | もう一つの大実験室 | クロマトや振盪機が あった機器室 |
上階の借用実験室 | 下階の機器室兼倉庫 | 唯一返却できなかった 居室 |