{"id":1025,"date":"2014-11-14T10:39:48","date_gmt":"2014-11-14T02:39:48","guid":{"rendered":"http:\/\/down.cdhaha.net\/?p=1025"},"modified":"2014-11-22T11:12:14","modified_gmt":"2014-11-22T03:12:14","slug":"ms14-075-vulnerability-in-internet-information-services-iis-could-allow-security-feature-bypass-2982998","status":"publish","type":"post","link":"http:\/\/down.cdhaha.net\/?p=1025","title":{"rendered":"MS14-076 Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass (2982998)"},"content":{"rendered":"<p><img decoding=\"async\" src=\"wp-content\/uploads\/2009\/12\/iis_logo.png\" alt=\"IIS\" title=\"IIS\" class=\"alignleft\" \/>This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass of the &#8220;IP and domain restrictions&#8221; security feature. Successful exploitation of this vulnerability could result in clients from restricted or blocked domains having access to restricted web resources.<\/p>\n<p>This security update is rated Important for all supported editions of <strong>Microsoft Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2 RTM<\/strong>. The security update addresses the vulnerability by changing how IIS handles requests when specific IP and domain restriction configurations exist.<br \/>\n<!--more--><\/p>\n<p>For more information about this document, see Microsoft Knowledge Base Article 2982998. <\/p>\n<p><strong>English Version<\/strong><br \/>\n<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/MS14-076\" target=\"_blank\">http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/MS14-076<\/a><\/p>\n<p><strong>\u7b80\u4f53\u4e2d\u6587\u7248<\/strong><br \/>\n<a href=\"http:\/\/technet.microsoft.com\/zh-cn\/security\/bulletin\/MS14-076\" target=\"_blank\">http:\/\/technet.microsoft.com\/zh-cn\/security\/bulletin\/MS14-076<\/a><\/p>\n<p>&nbsp;<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>This security update resolves a privately reported vulnerability in Microsoft Internet Information Services (IIS) that could lead to a bypass&#8230;<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[975],"tags":[382,381],"_links":{"self":[{"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=\/wp\/v2\/posts\/1025"}],"collection":[{"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1025"}],"version-history":[{"count":0,"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=\/wp\/v2\/posts\/1025\/revisions"}],"wp:attachment":[{"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1025"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/down.cdhaha.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}