<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Exim &#8211; FAQBOOK</title>
	<atom:link href="https://faqbook.net/category/%E8%B3%87%E5%AE%89%E9%80%9A%E5%A0%B1/exim/feed" rel="self" type="application/rss+xml" />
	<link>https://faqbook.net</link>
	<description>Some SOP  Note  Leamed Article</description>
	<lastBuildDate>Thu, 15 Mar 2018 01:52:35 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.2</generator>
	<item>
		<title>Exim 任意執行程式碼漏洞</title>
		<link>https://faqbook.net/exim-security-issues</link>
					<comments>https://faqbook.net/exim-security-issues#respond</comments>
		
		<dc:creator><![CDATA[derek]]></dc:creator>
		<pubDate>Thu, 15 Mar 2018 01:52:35 +0000</pubDate>
				<category><![CDATA[Exim]]></category>
		<category><![CDATA[資安通報]]></category>
		<category><![CDATA[exim]]></category>
		<category><![CDATA[exim-security-issues]]></category>
		<guid isPermaLink="false">http://faqbook.net/?p=538</guid>

					<description><![CDATA[<p>說明<br />
在2018年2月5日報告了Exim的base64解碼函數中的溢出漏洞，標識為CVE-2018-6789。自從exim第一次提交以來就存在這個錯誤，因此所有版本都受到影響。根據研究，可以利用它來獲得預授權遠程代碼執行，並且至少有400,000台服務器處於風險之中。補丁版本4.90.1已經發布，我們建議立即升級exim。</p>
<p>影響內容<br />
Exim 4.90.1之前的版本</p>
<p>這篇文章 <a rel="nofollow" href="https://faqbook.net/exim-security-issues">Exim 任意執行程式碼漏洞</a> 最早出現於 <a rel="nofollow" href="https://faqbook.net">FAQBOOK</a>。</p>
]]></description>
		
					<wfw:commentRss>https://faqbook.net/exim-security-issues/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
