<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cve-2022-3080 &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/cve-2022-3080/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Sat, 24 Sep 2022 05:45:19 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>常見的DNS套件BIND發布了數個漏洞，資安管理人員快手刀更新!!</title>
		<link>https://ailog.tw/lifelog/2022/09/24/bind-202209/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Sat, 24 Sep 2022 05:45:19 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[BIND]]></category>
		<category><![CDATA[cve-2022-2795]]></category>
		<category><![CDATA[cve-2022-2881]]></category>
		<category><![CDATA[cve-2022-2906]]></category>
		<category><![CDATA[cve-2022-3080]]></category>
		<category><![CDATA[cve-2022-38177]]></category>
		<category><![CDATA[cve-2022-38178]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[named]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=13721</guid>

					<description><![CDATA[透過BIND套件架設DNS是業界很普遍的作法，近期Internet Systems Consortium(IS &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2022/09/24/bind-202209/" class="more-link">閱讀全文<span class="screen-reader-text">〈常見的DNS套件BIND發布了數個漏洞，資安管理人員快手刀更新!!〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: verdana, geneva; font-size: 14pt;">透過BIND套件架設DNS是業界很普遍的作法，近期Internet Systems Consortium(ISC)官網發佈了多個有關bind套件的漏洞，DNS服務在企業是一個相當關鍵角色，且需要高度資安防護的部份，資安管理人員快手刀更新套件吧。<span id="more-13721"></span></span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">ISC發布多個bind相關漏洞套件：</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;"><a href="https://kb.isc.org/docs/cve-2022-2795">https://kb.isc.org/docs/cve-2022-2795</a></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;"><a href="https://kb.isc.org/docs/cve-2022-2881">https://kb.isc.org/docs/cve-2022-2881</a></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;"><a href="https://kb.isc.org/docs/cve-2022-2906">https://kb.isc.org/docs/cve-2022-2906</a></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;"><a href="https://kb.isc.org/docs/cve-2022-3080">https://kb.isc.org/docs/cve-2022-3080</a></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;"><a href="https://kb.isc.org/docs/cve-2022-38177">https://kb.isc.org/docs/cve-2022-38177</a></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;"><a href="https://kb.isc.org/docs/cve-2022-38178">https://kb.isc.org/docs/cve-2022-38178</a></span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">受影響的bind版本範圍：</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.0.0 至 9.16.32</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.18.0 至 9.18.6</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.19.0 至 9.19.4</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.9.3-S1 至 9.11.37-S1</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.16.8-S1 至 9.16.32-S1</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">官方建議更新版本：</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.16.33 (Current Stable)</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.18.7 (Current Stable)</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.19.5 (Development)</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">BIND 9.16.33-S1 (Supported Preview Edition)</span></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
