{"categories":["\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf","\u30b5\u30fc\u30d0"],"url":"https://tsusuzuki.hatenadiary.jp/entry/20140509/1399627094","blog_url":"https://tsusuzuki.hatenadiary.jp/","height":"190","provider_url":"https://hatena.blog","published":"2014-05-09 18:18:14","title":" (\u5f15\u7528\u8a18\u4e8b) \uff08\u7dca\u6025\uff09BIND 9.10.0\u306e\u8106\u5f31\u6027\uff08DNS\u30b5\u30fc\u30d3\u30b9\u306e\u505c\u6b62\uff09\u306b\u3064\u3044\u3066\uff082014\u5e745\u67089\u65e5\u516c\u958b\uff09 ","author_name":"TsuSUZUKI","author_url":"https://blog.hatena.ne.jp/TsuSUZUKI/","type":"rich","version":"1.0","width":"100%","description":"\u899a\u3048\u66f8\u304d\u306e\u307f\u3002 \u682a\u5f0f\u4f1a\u793e\u65e5\u672c\u30ec\u30b8\u30b9\u30c8\u30ea\u30b5\u30fc\u30d3\u30b9\uff08JPRS\uff09 http://jprs.jp/tech/security/2014-05-09-bind9-vuln-prefetch.html > \uff08\u7dca\u6025\uff09BIND 9.10.0\u306e\u8106\u5f31\u6027\uff08DNS\u30b5\u30fc\u30d3\u30b9\u306e\u505c\u6b62\uff09\u306b\u3064\u3044\u3066\uff082014\u5e745\u67089\u65e5\u516c\u958b\uff09 CVE-2014-3214 \u5bfe\u5fdc\u3002 ( \"Assigned (20140503)\" ) (\u95a2\u9023) Internet Systems Consortium http://ftp.isc.org/isc/bind9/9.10.0-P1/ > Index of /isc/bind9/9.10.0-P1/ Inte\u2026","image_url":null,"blog_title":"\u53d6\u7de0\u5f79 \u5e73\u793e\u54e1 \u30d6\u30ed\u30b0 (\u30d9\u30fc\u30bf\u7248) ","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ftsusuzuki.hatenadiary.jp%2Fentry%2F20140509%2F1399627094\" title=\" (\u5f15\u7528\u8a18\u4e8b) \uff08\u7dca\u6025\uff09BIND 9.10.0\u306e\u8106\u5f31\u6027\uff08DNS\u30b5\u30fc\u30d3\u30b9\u306e\u505c\u6b62\uff09\u306b\u3064\u3044\u3066\uff082014\u5e745\u67089\u65e5\u516c\u958b\uff09  - \u53d6\u7de0\u5f79 \u5e73\u793e\u54e1 \u30d6\u30ed\u30b0 (\u30d9\u30fc\u30bf\u7248) \" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_name":"Hatena Blog"}