<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>偶然 &#8211; 這世上 沒有偶然 只有必然</title>
	<atom:link href="https://wordpress.lokidea.com/tag/%E5%81%B6%E7%84%B6/feed/" rel="self" type="application/rss+xml" />
	<link>https://wordpress.lokidea.com</link>
	<description>幻幽的小小分享區</description>
	<lastBuildDate>Sun, 08 May 2016 12:21:38 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>ImageTragick漏洞的瞭解始末【129/366】</title>
		<link>https://wordpress.lokidea.com/837/imagetragick%e6%bc%8f%e6%b4%9e%e7%9a%84%e7%9e%ad%e8%a7%a3%e5%a7%8b%e6%9c%ab%e3%80%90129-366%e3%80%91/</link>
					<comments>https://wordpress.lokidea.com/837/imagetragick%e6%bc%8f%e6%b4%9e%e7%9a%84%e7%9e%ad%e8%a7%a3%e5%a7%8b%e6%9c%ab%e3%80%90129-366%e3%80%91/#respond</comments>
		
		<dc:creator><![CDATA[Barney Chen]]></dc:creator>
		<pubDate>Sun, 08 May 2016 12:21:38 +0000</pubDate>
				<category><![CDATA[每日一篇]]></category>
		<category><![CDATA[網路觀察]]></category>
		<category><![CDATA[總整理]]></category>
		<category><![CDATA[偶然]]></category>
		<category><![CDATA[漏洞]]></category>
		<guid isPermaLink="false">https://wordpress.lokidea.com/?p=837</guid>

					<description><![CDATA[這件事情我自己追蹤的始末是這樣 五月五號收到一封百度雲觀測的通知信 就是寫 ImageMagick 這個套件有 &#8230; <a href="https://wordpress.lokidea.com/837/imagetragick%e6%bc%8f%e6%b4%9e%e7%9a%84%e7%9e%ad%e8%a7%a3%e5%a7%8b%e6%9c%ab%e3%80%90129-366%e3%80%91/" class="more-link">閱讀全文 <span class="screen-reader-text">ImageTragick漏洞的瞭解始末【129/366】</span></a>]]></description>
										<content:encoded><![CDATA[<p>這件事情我自己追蹤的始末是這樣<br />
五月五號收到一封百度雲觀測的通知信<br />
<a href="http://wp2020.lokidea.com/wp-content/uploads/2016/05/screen-20160508191022001.jpg"><img fetchpriority="high" decoding="async" class="aligncenter size-large wp-image-836" src="https://wp2020.lokidea.com/wp-content/uploads/2016/05/screen-20160508191022001-1024x508.jpg" alt="screen-20160508191022001" width="840" height="417" /></a><br />
就是寫 ImageMagick 這個套件有一個遠程命令執行漏洞（CVE-2016-3714）<br />
詳細的內容<a href="http://ce.baidu.com/about/log?from=mail#anchor40" target="_blank" rel="noopener noreferrer">百度雲觀測的觀測新聞有寫</a><br />
會讓Wordpress有遠端漏洞，而且被定為高危漏洞<br />
<span id="more-837"></span><br />
因為部落格只有自己使用，就沒有特別關注這件事情<br />
而Wordpress在 5/6號也<a href="https://wordpress.org/news/2016/05/wordpress-4-5-2/">釋出了安全更新</a> 4.5.2 版本<br />
所以昨天更新完就順便寫了分享文章<br />
下面補充資料也提供很多相關的資訊<br />
補充資料：<br />
<a href="http://www.freebuf.com/vuls/103504.html">安全预警：ImageMagick图象处理软件存在远程代码执行(CVE-2016-3714)</a><br />
<a href="https://imagetragick.com/">ImageTragick</a><br />
<a href="https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&amp;t=29588">ImageMagick 論壇第一時間發表的文章</a><br />
<a href="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3714">CVE &#8211; CVE-2016-3714</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://wordpress.lokidea.com/837/imagetragick%e6%bc%8f%e6%b4%9e%e7%9a%84%e7%9e%ad%e8%a7%a3%e5%a7%8b%e6%9c%ab%e3%80%90129-366%e3%80%91/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
