{"width":"100%","author_url":"https://blog.hatena.ne.jp/Ash/","title":"\u6708\u520a\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c81\u6708\u53f7","blog_title":"Ash\u306e\u65e5\u8a18","description":"\u4eca\u6708\u306fFull-Disclosure\u3067\u306e\u4e88\u544a\u3069\u304a\u308a3\u672c\u7acb\u3066\u3067\u3057\u305f\u3002 Microsoft Internet Security and Acceleration Server 2000 H.323 \u30d5\u30a3\u30eb\u30bf\u306e\u8106\u5f31\u6027\u306b\u3088\u308a\u3001\u30ea\u30e2\u30fc\u30c8\u3067\u30b3\u30fc\u30c9\u304c\u5b9f\u884c\u3055\u308c\u308b (816458) (MS04-001) \u5371\u967a\u5ea6:\u7dca\u6025 Exchange Server 2003 \u306e\u8106\u5f31\u6027\u306b\u3088\u308a\u3001\u6a29\u9650\u304c\u6607\u683c\u3059\u308b (832759) (MS04-002) \u5371\u967a\u5ea6:\u8b66\u544a MDAC \u6a5f\u80fd\u306e\u30d0\u30c3\u30d5\u30a1 \u30aa\u30fc\u30d0\u30fc\u30e9\u30f3\u306b\u3088\u308a\u3001\u30b3\u30fc\u30c9\u304c\u5b9f\u884c\u3055\u308c\u308b (832483) (MS04-003) \u5371\u967a\u5ea6:\u91cd\u8981 \u500b\u4eba\u7684\u306b\u95a2\u4fc2\u304c\u3042\u308b\u306e\u306fMDAC\u3060\u3051\u3060\u306a\u3041\u3002\u3064\u30fc\u304b\u3001\u2026","image_url":null,"version":"1.0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fash-2.hatenadiary.org%2Fentry%2F20040114%2F1\" title=\"\u6708\u520a\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c81\u6708\u53f7 - Ash\u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["Vulns","Windows"],"author_name":"Ash","provider_name":"Hatena Blog","published":"2004-01-14 09:00:01","url":"https://ash-2.hatenadiary.org/entry/20040114/1","type":"rich","height":"190","blog_url":"https://ash-2.hatenadiary.org/","provider_url":"https://hatena.blog"}