<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Exchange &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/exchange/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Sun, 02 May 2021 10:20:46 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼</title>
		<link>https://ailog.tw/lifelog/2021/05/02/exchange/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Sun, 02 May 2021 10:20:46 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[CVE-2021-28480]]></category>
		<category><![CDATA[CVE-2021-28481]]></category>
		<category><![CDATA[CVE-2021-28482]]></category>
		<category><![CDATA[CVE-2021-28483]]></category>
		<category><![CDATA[Exchange]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=7976</guid>

					<description><![CDATA[微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼，有在維護 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/05/02/exchange/" class="more-link">閱讀全文<span class="screen-reader-text">〈微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt;">微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼，有在維護該平台主機的管理者記得盡快更新。<span id="more-7976"></span></span></p>
<p><span style="font-size: 14pt;">攻擊者透過該漏洞(CVE-2021-28480~28483)，可以透過遠端發送特製請求，利用此漏洞進而執行任意代碼。</span></p>
<p><span style="font-size: 14pt;">影響的Exchange版本：</span><br />
<span style="font-size: 14pt;">Microsoft Exchange Server 2013  </span><br />
<span style="font-size: 14pt;">Microsoft Exchange Server 2016  </span><br />
<span style="font-size: 14pt;">Microsoft Exchange Server 2019 </span></p>
<p><span style="font-size: 14pt;">解決方法：</span><br />
<span style="font-size: 14pt;">微軟官方已釋出對應的修補更新程式。</span><br />
<span style="font-size: 14pt;">CVE-2021-28480：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28480">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28480</a></span></p>
<p><span style="font-size: 14pt;">CVE-2021-28481：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28481">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28481</a></span></p>
<p><span style="font-size: 14pt;">CVE-2021-28482：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28482">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28482</a></span></p>
<p><span style="font-size: 14pt;">CVE-2021-28483：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28483">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28483</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>微軟釋出EOMT工具暫時緩解Exchange Server的ProxyLogon漏洞</title>
		<link>https://ailog.tw/lifelog/2021/03/18/eomt/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Thu, 18 Mar 2021 01:53:55 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[CVE-2021-26855]]></category>
		<category><![CDATA[EOMT]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Exchange On-Premises Mitigation Tool]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[ProxyLogon]]></category>
		<category><![CDATA[修補]]></category>
		<category><![CDATA[微軟]]></category>
		<category><![CDATA[微軟釋出EOMT工具暫時緩解Exchange Server的ProxyLogon漏洞]]></category>
		<category><![CDATA[攻擊]]></category>
		<category><![CDATA[漏洞]]></category>
		<category><![CDATA[零時差]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=7384</guid>

					<description><![CDATA[微軟Exchange Server的Mail Server產品近期被發現了 4 個重大零時差漏洞，微軟在202 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/03/18/eomt/" class="more-link">閱讀全文<span class="screen-reader-text">〈微軟釋出EOMT工具暫時緩解Exchange Server的ProxyLogon漏洞〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt;">微軟Exchange Server的Mail Server產品近期被發現了 4 個重大零時差漏洞，微軟在2021-03-15釋出Microsoft Exchange On-Premises Mitigation Tool(EOMT)工具，讓客戶透過Powershell script可以緩解由CVE-2021-26855漏洞所遭受的資安風險。<span id="more-7384"></span></span></p>
<p><span style="font-size: 14pt;"><strong>工具下載網址：</strong></span><br />
<span style="font-size: 14pt;"><a href="https://github.com/microsoft/CSS-Exchange/tree/main/Security">https://github.com/microsoft/CSS-Exchange/tree/main/Security</a></span></p>
<p><span style="font-size: 14pt;"><img fetchpriority="high" decoding="async" class="alignnone wp-image-7386 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-01.png" alt="" width="585" height="262" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-01.png 585w, https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-01-300x134.png 300w" sizes="(max-width: 585px) 100vw, 585px" /></span></p>
<p><span style="font-size: 14pt;">EOMT快速下載連結：</span><br />
<span style="font-size: 14pt;"><a href="https://github.com/microsoft/CSS-Exchange/releases/latest/download/EOMT.ps1">https://github.com/microsoft/CSS-Exchange/releases/latest/download/EOMT.ps1</a></span></p>
<p><span style="font-size: 14pt;"><strong>適用的系統環境要求：</strong></span><br />
<span style="font-size: 14pt;">(1)、PowerShell 3或更高版本</span><br />
<span style="font-size: 14pt;">(2)、IIS 7.5及更高版本</span><br />
<span style="font-size: 14pt;">(3)、<span style="color: #ff0000;">Exchange 2013、2016或2019</span></span><br />
<span style="font-size: 14pt;">(4)、Windows Server 2008 R2，Server 2012，Server 2012 R2，Server 2016，Server 2019</span></p>
<p><span style="font-size: 14pt;">工具使用方法：</span><br />
<span style="font-size: 14pt;">(1)、啟動PowerShell命令提示字元</span><br />
<span style="font-size: 14pt;"><img decoding="async" class="alignnone wp-image-7391 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-02.png" alt="" width="472" height="120" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-02.png 472w, https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-02-300x76.png 300w" sizes="(max-width: 472px) 100vw, 472px" /></span></p>
<p><span style="font-size: 14pt;">(2)、執行剛剛下載的「<a href="https://github.com/microsoft/CSS-Exchange/releases/latest/download/EOMT.ps1">EOMT.ps1</a>」Powershell script</span><br />
<span style="font-size: 14pt;">如有顯示安全性告警，則輸入「R」執行即可。</span><br />
<span style="font-size: 14pt;"><img decoding="async" class="alignnone wp-image-7390 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-03.png" alt="" width="652" height="130" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-03.png 652w, https://ailog.tw/lifelog/wp-content/uploads/2021/03/eomt-03-300x60.png 300w" sizes="(max-width: 652px) 100vw, 652px" /></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
