<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>1903 &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/1903/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Wed, 25 Mar 2020 14:42:07 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>微軟緊急釋出CVE-2020-0796修補，趕快安裝!</title>
		<link>https://ailog.tw/lifelog/2020/03/25/cve-2020-0796/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 25 Mar 2020 14:24:25 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[1903]]></category>
		<category><![CDATA[1909]]></category>
		<category><![CDATA[CVE-2020-0796]]></category>
		<category><![CDATA[Microsoft Server Message Block 3.1.1]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows Server]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=2716</guid>

					<description><![CDATA[微軟在2020/03/12緊急發佈了日前沒有修補的CVE-2020-0796漏洞，該漏洞存在於Microsof &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2020/03/25/cve-2020-0796/" class="more-link">閱讀全文<span class="screen-reader-text">〈微軟緊急釋出CVE-2020-0796修補，趕快安裝!〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>微軟在2020/03/12緊急發佈了日前沒有修補的CVE-2020-0796漏洞，該漏洞存在於Microsoft Server Message Block 3.1.1(SMB v3)協定<span id="more-2716"></span>，透過該漏洞駭客可藉由惡意封包來觸發下溢，以讀取核心，或是觸發上溢來覆蓋核心中的寫入指標。現在因為疫情關係，許多企業都開放了遠端連線功能，小編在此呼籲大家盡快完成更新佈署，避免發生災情。</p>
<p>需要修補作業系統有：<br />
Windows 10 1903版本<br />
Windows 10 1909版本<br />
Windows Server 1903版本<br />
Windows Server 1909版本</p>
<p>如Windows Server無法安裝修補檔案，可以透過下列PowerShell 語法先將SMB v3壓縮功能關閉。(關閉該功能無須重新開機)<br />
Set-ItemProperty -Path &#8220;HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters&#8221; DisableCompression -Type DWORD -Value 1 -Force</p>
<p>微軟官方修補說明：<br />
<a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796</a></p>
<p>微軟官方修補檔案下載：<br />
<a href="https://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762">https://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
