<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>RCE &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/rce/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Tue, 16 Feb 2021 03:54:13 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Windows RCE重大漏洞已有攻擊出現</title>
		<link>https://ailog.tw/lifelog/2020/03/24/windows-rce/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 24 Mar 2020 13:38:12 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Adobe Type 1 PostScript]]></category>
		<category><![CDATA[ATMFD.dll]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[Type Manager Library]]></category>
		<category><![CDATA[Windows RCE]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=2704</guid>

					<description><![CDATA[重大漏洞已有攻擊出現! Windows一項元件具有2個重大遠端程式碼執行漏洞（remote code exec &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2020/03/24/windows-rce/" class="more-link">閱讀全文<span class="screen-reader-text">〈Windows RCE重大漏洞已有攻擊出現〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt;"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-2706" src="https://ailog.tw/lifelog/wp-content/uploads/2020/03/513657.jpg" alt="" width="1613" height="1015" srcset="https://ailog.tw/lifelog/wp-content/uploads/2020/03/513657.jpg 1613w, https://ailog.tw/lifelog/wp-content/uploads/2020/03/513657-300x189.jpg 300w, https://ailog.tw/lifelog/wp-content/uploads/2020/03/513657-768x483.jpg 768w, https://ailog.tw/lifelog/wp-content/uploads/2020/03/513657-1024x644.jpg 1024w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" />重大漏洞已有攻擊出現!</span></p>
<p><span style="font-size: 14pt;">Windows一項元件具有2個重大遠端程式碼執行漏洞（remote code execution、RCE)，這2項漏洞是在Windows內建的Adobe Type Manager Library (ATMFD.dll)元件中裡。<span id="more-2704"></span></span></p>
<p><span style="font-size: 14pt;">影響的作業系統有：</span><br />
<span style="font-size: 14pt;">Windows 7</span><br />
<span style="font-size: 14pt;">Windows 8.1</span><br />
<span style="font-size: 14pt;">Windows RT</span><br />
<span style="font-size: 14pt;">Windows 10所有版本</span><br />
<span style="font-size: 14pt;">Windows Server 2008</span><br />
<span style="font-size: 14pt;">Windows 2012</span><br />
<span style="font-size: 14pt;">Windows 2016</span><br />
<span style="font-size: 14pt;">Windows 2019</span></p>
<p><span style="font-size: 14pt;">建議措施：</span><br />
<span style="font-size: 14pt;">微軟建議用戶關閉「檔案總管」中的預覽窗格及詳細內容窗格，可防止檔案總管顯示OpenType字型，或是關閉WebClient服務。</span></p>
<p><span style="font-size: 14pt;">微軟官方說明：</span><br />
<span style="font-size: 14pt;"><a href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv200006">https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv200006</a></span></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
