{"id":4403,"date":"2020-08-06T00:58:59","date_gmt":"2020-08-06T00:58:59","guid":{"rendered":"http:\/\/www.manageengine.jp\/support\/kb\/Desktop_Central\/?p=4403"},"modified":"2020-10-22T04:59:20","modified_gmt":"2020-10-22T04:59:20","slug":"%e3%80%90%e4%bf%ae%e6%ad%a3%e6%b8%88%e3%80%91desktop-central%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7cve-2020-15588%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6","status":"publish","type":"post","link":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/?p=4403","title":{"rendered":"\u3010\u4fee\u6b63\u6e08\u3011Desktop Central\u306e\u8106\u5f31\u6027(CVE-2020-15588)\u306b\u3064\u3044\u3066"},"content":{"rendered":"<h4>\u3010\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u3011Desktop Central\u306e\u8106\u5f31\u6027(CVE-2020-15588)\u306b\u3064\u3044\u3066<\/h4>\n<h5>\u3010\u5bfe\u8c61\u30d3\u30eb\u30c9\u3011<\/h5>\n<p><del datetime=\"2020-10-13T08:29:51+00:00\">Desktop Central 10.0.532\u4ee5\u524d\u306e\u30d3\u30eb\u30c9<\/del> <span style=\"color: gray\">2020\/10\/13 17:45\u4fee\u6b63<\/span><br \/>\nDesktop Central 10.0.533\u4ee5\u524d\u306e\u30d3\u30eb\u30c9 \u304a\u3088\u3073 Desktop Central Windows\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8 10.0.552.W<br \/>\n\u307e\u305f\u3001\u95a2\u9023\u3059\u308b\u8106\u5f31\u6027\u3068\u3057\u3066 <a href=\"https:\/\/www.manageengine.jp\/support\/kb\/Desktop_Central\/?p=4961\" target=\"_blank\">CVE-2020-24397<\/a> \u304c\u5831\u544a\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h5>\u3010\u554f\u984c\u3011<\/h5>\n<p>\u4e0a\u8a18\u5bfe\u8c61\u30d3\u30eb\u30c9\u306eDesktop Central\u306b\u306f\u6574\u6570\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u8106\u5f31\u6027\u304c\u5b58\u5728\u3057\u307e\u3059\u3002( CVE-2020-15588 )\u3002<\/p>\n<ul>\n<li> <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-15588\" target=\"_blank\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-15588<\/a>(CVE,\u82f1\u8a9e)<\/li>\n<li> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15588\" target=\"_blank\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15588<\/a>(\u7c73\u56fd\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240, \u82f1\u8a9e)<\/li>\n<li> <a href=\"https:\/\/www.manageengine.com\/products\/desktop-central\/integer-overflow-vulnerability.html\" target=\"_blank\">https:\/\/www.manageengine.com\/products\/desktop-central\/integer-overflow-vulnerability.html<\/a>(Zoho Corporation, \u82f1\u8a9e)<\/li>\n<\/ul>\n<h5>\u3010\u8a73\u7d30\u3011<\/h5>\n<p>\u8a8d\u8a3c\u3055\u308c\u305f\u30e6\u30fc\u30b6\u306f Report Name \u30d1\u30e9\u30e1\u30fc\u30bf\u306b\u4efb\u610f\u306e HTML \u30b3\u30fc\u30c9\u3092\u6ce8\u5165\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<h5>\u3010\u5bfe\u51e6\u65b9\u6cd5\u3011<\/h5>\n<p><del datetime=\"2020-10-13T08:29:51+00:00\">\u672c\u8106\u5f31\u6027\u304c\u4fee\u6b63\u3055\u308c\u305fDesktop Central 10.0.533\u3078\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9\u3057\u307e\u3059\u3002<\/del> <span style=\"color: gray\">2020\/10\/13 17:45\u4fee\u6b63<\/span><br \/>\nDesktop Central 10.0.562\u4ee5\u964d\u3078\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9\u3057\u307e\u3059\u3002<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u3010\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u3011Desktop Central\u306e\u8106\u5f31\u6027(CVE-2020-15588)\u306b\u3064\u3044\u3066 \u3010\u5bfe\u8c61\u30d3\u30eb\u30c9\u3011 Desktop Central 10.\u2026 <a href=\"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/?p=4403\" class=\"more\">\uff3b\u7d9a\u304d\u3092\u8aad\u3080\uff3d<\/a><\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[436,6],"tags":[770,46,771,466],"class_list":["post-4403","post","type-post","status-publish","format-standard","hentry","category-08security","category-09known-issue","tag-cve-2020-15588","tag-46","tag-771","tag-466"],"modified_by":"seiji","_links":{"self":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts\/4403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4403"}],"version-history":[{"count":5,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts\/4403\/revisions"}],"predecessor-version":[{"id":5024,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=\/wp\/v2\/posts\/4403\/revisions\/5024"}],"wp:attachment":[{"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.manageengine.jp\/support\/kb\/Endpoint_Central\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}