{"id":1092,"date":"2011-03-16T12:46:13","date_gmt":"2011-03-16T04:46:13","guid":{"rendered":"http:\/\/localhost\/portal\/2011\/03\/16\/adobe-flash-acrobat-reader-zero-day-attack\/"},"modified":"2011-03-16T12:46:13","modified_gmt":"2011-03-16T04:46:13","slug":"adobe-flash-acrobat-reader-zero-day-attack","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1092","title":{"rendered":"Adobe Flash\u53c8\u6709\u96f6\u6642\u5dee\u6f0f\u6d1e\u653b\u64ca"},"content":{"rendered":"<p>\u6587\/<a target=\"_blank\" href=\"http:\/\/www.ithome.com.tw\/itadm\/article.php?c=66475\" rel=\"noopener\">iThome online<\/a> \u6c88\u7d93 2011-03-15<\/p>\n<p>\u8a72\u6f0f\u6d1e\u53ef\u80fd\u5c0e\u81f4\u7576\u6a5f\uff0c\u4e26\u8b93\u99ed\u5ba2\u63a7\u5236\u88ab\u653b\u64ca\u7684\u96fb\u8166\u3002Adobe\u9810\u8a08\u5c07\u65bc\u4e0b\u9031\u7279\u5225\u70ba\u6b64\u6f0f\u6d1e\u91cb\u51fa\u4fee\u88dc\u7a0b\u5f0f\uff0c\u539f\u672cAcrobat\/Reader\u4e0b\u4e00\u6b21\u5b9a\u671f\u66f4\u65b0\u57286\/14\u3002<\/p>\n<p>Adobe\u767c\u51fa\u8cc7\u5b89\u8b66\u5831\u6307\u51fa\uff0c\u8a72\u516c\u53f8Flash\/Acrobat\/Reader\u7b49\u7522\u54c1\u5728\u591a\u500b\u5e73\u53f0\u8207\u7248\u672c\u4e2d\u518d\u5ea6\u51fa\u73fe\u96f6\u6642\u5dee\u6f0f\u6d1e\uff0c\u4e26\u5df2\u7d93\u51fa\u73fe\u653b\u64ca\u4e8b\u4ef6\u3002<\/p>\n<p>\u6b64\u6f0f\u6d1e\u5b58\u5728\u65bcFlash Player Windows\/Mac OS X\/Linux\/Solaris\/Android\/Chrome\u7b49\u5e73\u53f0\u76ee\u524d\u53ca\u4e4b\u524d\u7248\u672c\u3002Acrobat\/Reader\u53d7\u6240\u4f7f\u7528\u7684Authplay.dll \u5f71\u97ff\uff0cWindows\/Mac OS X 10.0.1\u53ca\u4e4b\u524d\u7248\u672c\u30019.X\u53ca\u4e4b\u524d\u7248\u672c\u5747\u5177\u6709\u6b64\u6f0f\u6d1e\u3002\u5404\u4f5c\u696d\u7cfb\u7d71Acrobat\/Reader 8.X\u7248\u672c\u4e0d\u53d7\u8a72\u6f0f\u6d1e\u5f71\u97ff\uff0cUnix Reader 9.x\u7248\u53caAndroid\u4ea6\u4e0d\u53d7\u5f71\u97ff\u3002<\/p>\n<p>\u8a72\u6f0f\u6d1e\u53ef\u80fd\u5c0e\u81f4\u7576\u6a5f\uff0c\u4e26\u8b93\u99ed\u5ba2\u63a7\u5236\u88ab\u653b\u64ca\u7684\u96fb\u8166\u3002\u63d0\u5831\u4eba\u54e1\u662f\u5728\u96fb\u5b50\u90f5\u4ef6\u4e2d\uff0c\u767c\u73fe\u4e00\u500bExcel\u8a66\u7b97\u8868\u593e\u5e36\u60e1\u610fFlash\u6a94\u6848\u3002\u7531\u65bcAcrobat X Windows\u7248\u7684\u6c99\u7bb1\u6280\u8853\u53ef\u9632\u8b77\u985e\u4f3c\u7684\u653b\u64ca\uff0c\u56e0\u6b64Adobe\u4e00\u958b\u59cb\u8aa4\u4ee5\u70baAcrobat\/Reader\u4e0d\u53d7\u5f71\u97ff\u3002\u6839\u64da\u5361\u5df4\u65af\u57fa\u7684\u8cc7\u6599\u986f\u793a\uff0c\u8a72\u60e1\u610f\u653b\u64ca\u5728 Windows 7\u4e2d\u6703\u88ab\u6291\u6b62\uff0c\u4f46\u80fd\u5728Windows XP\u4e2d\u767c\u5a01\u3002<\/p>\n<p>Adobe\u9810\u8a08\u5c07\u65bc\u4e0b\u9031\u7279\u5225\u70ba\u6b64\u6f0f\u6d1e\u91cb\u51fa\u4fee\u88dc\u7a0b\u5f0f\uff0c\u539f\u672cAcrobat\/Reader\u4e0b\u4e00\u6b21\u5b9a\u671f\u66f4\u65b0\u57286\/14\u3002\uff08\u7de8\u8b6f\/\u6c88\u7d93\uff09  <\/p>\n<p><script type=\"text\/javascript\"><!--\ngoogle_ad_client = \"ca-pub-1319158505166829\";\n\/* 468x60, \u5df2\u5efa\u7acb 2010\/10\/17 *\/\ngoogle_ad_slot = \"7257811969\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 60;\n\/\/-->\n<\/script> <script type=\"text\/javascript\"\nsrc=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\n<\/script> <br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6587\/iThome online \u6c88\u7d93 2011-03-15 \u8a72\u6f0f\u6d1e\u53ef\u80fd\u5c0e\u81f4\u7576\u6a5f\uff0c\u4e26\u8b93\u99ed\u5ba2\u63a7\u5236\u88ab\u653b\u64ca\u7684\u96fb\u8166\u3002Ad [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1092","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1092"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1092\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}