½Ã½ºÅÛ°ü¸®ÀÚÀÇ ½°ÅÍ Ä¿ÇǴнº Ä¿ÇÇÇâÀÌ ³ª´Â *NIX
Ä¿ÇǴнº
½Ã½ºÅÛ/³×Æ®¿÷/º¸¾ÈÀ» ´Ù·ç´Â °÷
 FAQFAQ   °Ë»ö°Ë»ö   ¸â¹ö¸®½ºÆ®¸â¹ö¸®½ºÆ®   »ç¿ëÀÚ ±×·ì»ç¿ëÀÚ ±×·ì   »ç¿ëÀÚ µî·ÏÇϱâ»ç¿ëÀÚ µî·ÏÇϱâ 
 °³ÀÎ Á¤º¸°³ÀÎ Á¤º¸   ºñ°ø°³ ¸Þ½ÃÁö¸¦ È®ÀÎÇÏ·Á¸é ·Î±×ÀÎÇϽʽÿÀºñ°ø°³ ¸Þ½ÃÁö¸¦ È®ÀÎÇÏ·Á¸é ·Î±×ÀÎÇϽʽÿÀ   ·Î±×Àηα×ÀΠ

°¡ÀÔ¾øÀÌ ´©±¸³ª ±ÛÀ» ¾µ ¼ö ÀÖ½À´Ï´Ù. °øÁö»çÇ׿¡ ´ëÇÑ ´ñ±Û±îÁöµµ..




BBS >> ¼³Ä¡, ¿î¿µ Q&A | ³×Æ®¿÷, º¸¾È Q&A | ÀÏ¹Ý Q&A || Á¤º¸¸¶´ç | AWS || ÀÚÀ¯°Ô½ÃÆÇ | ±¸Àα¸Á÷ || °øÁö»çÇ× | ÀǰßÁ¦½Ã
¿ÀǼҽºÂÊ¿¡¼­ ÀͽºÇ÷η¯ ¹ö±× ÆÐÄ¡¸¦ ¸±¸®Áî

 
±Û ¾²±â   ´äº¯ ´Þ±â    Ä¿ÇǴнº, ½Ã½ºÅÛ ¿£Áö´Ï¾îÀÇ ½°ÅÍ °Ô½ÃÆÇ À妽º -> *NIX / IT Á¤º¸
ÀÌÀü ÁÖÁ¦ º¸±â :: ´ÙÀ½ ÁÖÁ¦ º¸±â  
±Û¾´ÀÌ ¸Þ½ÃÁö
truefeel
Ä«Æä °ü¸®ÀÚ


°¡ÀÔ: 2003³â 7¿ù 24ÀÏ
¿Ã¸° ±Û: 1277
À§Ä¡: ´ëÇѹα¹

¿Ã¸®±â¿Ã·ÁÁü: 2003.12.20 Åä, 12:49 am    ÁÖÁ¦: ¿ÀǼҽºÂÊ¿¡¼­ ÀͽºÇ÷η¯ ¹ö±× ÆÐÄ¡¸¦ ¸±¸®Áî Àοë°ú ÇÔ²² ´äº¯

¾ó¸¶Àü¿¡ ÀͽºÇ÷η¯¿¡¼­ URL½ºÇªÇÎÇÒ ¼ö ÀÖ´Â(ÁÖ¼Òâ¿¡ ´Ù¸¥ »çÀÌÆ®¸¦ ³» »çÀÌÆ®Ã³·³ º¸ÀÌ°Ô ÇÒ ¼ö ÀÖ´Â)
¹ö±×°¡ ¼Ò°³µÇ¾ú½À´Ï´Ù.

* °¡Â¥ »çÀÌÆ®¸¦ ÁøÂ¥Ã³·³ º¸ÀÌ°Ô ÇÏ´Â IE ¹ö±× http://coffeenix.net/bbs/viewtopic.php?t=342 (12.12)

¹Ù·Î ±× Ãë¾àÁ¡À» ÆÐÄ¡ÇÑ °ÍÀ» ¿ÀÇ ¼Ò½º¿Í ÇÁ¸®¿þ¾î °³¹ß À¥»çÀÌÆ®ÀÎ Openwares.org°¡ ¸±¸®Áî Çß´Ù´Â °ÍÀÔ´Ï´Ù.
¿ô±âÁÒ?
MS¿¡¼­ ¸ÕÀú ¹ßÇ¥ÇÏÁö ¾Ê°í ¿ÀǼҽºÂÊ¿¡¼­ ¹ßÇ¥¸¦ ÇÏ´Ù´Ï.
MS °³¹ßÀÚµéÀÇ Ç¥Á¤ÀÌ ¾î¶³±î¿ä? ±Ã±ÝÇØÁý´Ï´Ù.
ÀÚ±âµéÀÇ ½Ç¼ö¸¦ ±×Åä·Ï ÀûÀ¸·Î ¿©±â´Â(?) ¿ÀǼҽºÂÊ¿¡¼­ ¸ÕÀú ÇØ°áÇßÀ¸´Ï ¸»ÀÌÁÒ.
MS´Â ¿ÀǼҽºÀÇ ¹ßºü¸¥ ´ëó¸¦ ¹è¿ö¾ßÇÒ °ÍÀÔ´Ï´Ù.


http://www.openwares.org/ °¡ ±× »çÀÌÆ®À̰í (¿©±â¼­µµ ¿ÞÂÊ ¸µÅ©¿¡¼­ ¹ÞÀ» ¼ö ÀÖ¾î¿ä.)
http://security.openwares.org/ ¿¡¼­ ´Ù¿î·ÎµåÇÒ ¼ö ÀÖ½À´Ï´Ù. ÆÐÄ¡ ¼Ò½ºµµ Á¦°ø.

ÇöÀç 2753¸íÀÌ ¹Þ¾Æ°¬±º¿ä.

Àοë:

Internet Explorer URL Spoofing Vulnerability


Release Date: 2003-12-10
Last Update: 2003-12-14

Critical: Highly critical
Impact: ID Spoofing
Where: From remote

Software: Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6


Description:
A vulnerability has been identified in Internet Explorer, which can be exploited by malicious people to display a fake URL in the address and status bars.

The vulnerability is caused due to an input validation error, which can be exploited by including the "%01" and "%00" URL encoded representations after the username and right before the "@" character in an URL.
... »ý·« ...


/. ÀÇ http://slashdot.org/article.pl?sid=03/12/19/0135211 ±â»çÀÇ ´ñ±Û¿¡´Â Èï¹Ì·Î¿î°Ô Àֳ׿ä.

Àοë:

In other news...

Today Micro$oft contributed code to the Linux kernel, and announced plans to help iron out differences between Mozilla and MSIE Smile

¿À´Ã MS´Â ¸®´ª½º Ä¿³Î¿¡ Äڵ带 Á¦°øÇß¾ú°í,
¸ðÁú¶ó¿Í ÀͽºÇ÷ΰ£ÀÇ ´Ù¸¥ ¹®Á¦(HTMLÇ¥½Ã ¹®Á¦ºÎÅÍ ÇØ¼­...)¸¦ ÇØ°áÇϴµ¥ µµ¿òÀÌ µÉ °èȹÀ̶ó°í ¹ßÇ¥Çß´Ù.

ÀÌ ¸»ÀÌ »ç½ÇÀϱî???
À§·Î
»ç¿ëÀÚ Á¤º¸ º¸±â ºñ¹Ð ¸Þ½ÃÁö º¸³»±â ±Û ¿Ã¸°ÀÌÀÇ À¥»çÀÌÆ® ¹æ¹®
ÀÌÀü ±Û Ç¥½Ã:   
±Û ¾²±â   ´äº¯ ´Þ±â    Ä¿ÇǴнº, ½Ã½ºÅÛ ¿£Áö´Ï¾îÀÇ ½°ÅÍ °Ô½ÃÆÇ À妽º -> *NIX / IT Á¤º¸ ½Ã°£´ë: GMT + 9 ½Ã°£(Çѱ¹)
ÆäÀÌÁö 1 Áß 1

 
°Ç³Ê¶Ù±â:  
»õ·Î¿î ÁÖÁ¦¸¦ ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù
´ä±ÛÀ» ¿Ã¸± ¼ö ÀÖ½À´Ï´Ù
ÁÖÁ¦¸¦ ¼öÁ¤ÇÒ ¼ö ¾ø½À´Ï´Ù
¿Ã¸° ±ÛÀ» »èÁ¦ÇÒ ¼ö ¾ø½À´Ï´Ù
ÅõÇ¥¸¦ ÇÒ ¼ö ¾ø½À´Ï´Ù


Powered by phpBB © 2001, 2005 phpBB Group