<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Windows AD &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/windows-ad/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Sat, 23 Jan 2021 07:12:21 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Windows AD遭受Zerologon漏洞威脅，快更新!!!</title>
		<link>https://ailog.tw/lifelog/2020/10/06/cve-2020-1472/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 14:55:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[CVE-2020-1472]]></category>
		<category><![CDATA[MS-NRPC]]></category>
		<category><![CDATA[Netlogon]]></category>
		<category><![CDATA[Samba]]></category>
		<category><![CDATA[Windows AD]]></category>
		<category><![CDATA[Windows AD遭受Zerologon漏洞威脅，快更新!!!]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=5401</guid>

					<description><![CDATA[微軟在2020年8月11日發佈了一個編號CVE-2020-1472的安全漏洞告警，攻擊者透過Netlogon遠 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2020/10/06/cve-2020-1472/" class="more-link">閱讀全文<span class="screen-reader-text">〈Windows AD遭受Zerologon漏洞威脅，快更新!!!〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>微軟在2020年8月11日發佈了一個編號CVE-2020-1472的安全漏洞告警，攻擊者透過Netlogon遠端協定(MS-NRPC)連線到Windows AD網域控制站進而獲得管理者權限。</p>
<p>微軟原廠說明網頁：<br />
<a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472</a><br />
<img fetchpriority="high" decoding="async" class="alignnone wp-image-5403 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2020/10/CVE-2020-1472-01.png" alt="" width="657" height="124" srcset="https://ailog.tw/lifelog/wp-content/uploads/2020/10/CVE-2020-1472-01.png 657w, https://ailog.tw/lifelog/wp-content/uploads/2020/10/CVE-2020-1472-01-300x57.png 300w" sizes="(max-width: 657px) 100vw, 657px" /></p>
<p><span id="more-5401"></span></p>
<p>但不只Windows AD遭受影響，如果是採用Samba作為網域控制站，在4.7版本(包含)以下且「server schannel」設定參數採用預設值的話，則一樣會遭受CVE-2020-1472漏洞的威脅。</p>
<p>※Samba 4.8版本「server schannel」參數的預設值改為「server schannel = yes」。<br />
※如果將Samba單純作為網路檔案共享則不受CVE-2020-1472漏洞的威脅。</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
