{"image_url":null,"provider_name":"Hatena Blog","version":"1.0","url":"https://tsusuzuki.hatenadiary.jp/entry/20180613/1528899802","width":"100%","author_url":"https://blog.hatena.ne.jp/TsuSUZUKI/","title":" (\u5f15\u7528\u8a18\u4e8b) BIND 9.x\u306e\u8106\u5f31\u6027\uff08\u30b5\u30fc\u30d3\u30b9\u63d0\u4f9b\u8005\u304c\u610f\u56f3\u3057\u306a\u3044\u30a2\u30af\u30bb\u30b9\u306e\u8a31\u53ef\uff09\u306b\u3064\u3044\u3066 ","published":"2018-06-13 23:23:22","categories":["\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf","\u30b5\u30fc\u30d0"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ftsusuzuki.hatenadiary.jp%2Fentry%2F20180613%2F1528899802\" title=\" (\u5f15\u7528\u8a18\u4e8b) BIND 9.x\u306e\u8106\u5f31\u6027\uff08\u30b5\u30fc\u30d3\u30b9\u63d0\u4f9b\u8005\u304c\u610f\u56f3\u3057\u306a\u3044\u30a2\u30af\u30bb\u30b9\u306e\u8a31\u53ef\uff09\u306b\u3064\u3044\u3066  - \u53d6\u7de0\u5f79 \u5e73\u793e\u54e1 \u30d6\u30ed\u30b0 (\u30d9\u30fc\u30bf\u7248) \" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","description":"\u682a\u5f0f\u4f1a\u793e\u65e5\u672c\u30ec\u30b8\u30b9\u30c8\u30ea\u30b5\u30fc\u30d3\u30b9\uff08JPRS\uff09 https://jprs.jp/tech/security/2018-06-13-bind9-vuln-acl.html > BIND 9.x\u306e\u8106\u5f31\u6027\uff08\u30b5\u30fc\u30d3\u30b9\u63d0\u4f9b\u8005\u304c\u610f\u56f3\u3057\u306a\u3044\u30a2\u30af\u30bb\u30b9\u306e\u8a31\u53ef\uff09\u306b\u3064\u3044\u3066 > \uff08CVE-2018-5738\uff09 ACL \u8a2d\u5b9a ( named.conf ) \u3067\u56de\u907f\u53ef\u80fd\u3002 BIND 9.10.8 / 9.11.4 / 9.12.2 \u3067\u4fee\u6b63\u3055\u308c\u308b\u4e88\u5b9a\u3002 Internet Systems Consortium https://ftp.isc.org/isc/bind9/9.12.1-P2/ > Index of /isc/bind\u2026","blog_title":"\u53d6\u7de0\u5f79 \u5e73\u793e\u54e1 \u30d6\u30ed\u30b0 (\u30d9\u30fc\u30bf\u7248) ","height":"190","type":"rich","author_name":"TsuSUZUKI","blog_url":"https://tsusuzuki.hatenadiary.jp/"}