{"id":1234,"date":"2018-07-03T10:20:33","date_gmt":"2018-07-03T15:20:33","guid":{"rendered":"https:\/\/cert.pa\/?p=1234"},"modified":"2018-07-03T10:20:33","modified_gmt":"2018-07-03T15:20:33","slug":"csirt-panama-aviso-2018-07-03-actualizaciones-de-seguridad-para-vmware","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1234","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-07-03 actualizaciones de seguridad para VMware."},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-07-03 actualizaciones de seguridad para VMware.<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Julio, 2018<br \/>\nFuente: https:\/\/www.vmware.com\/security\/advisories\/VMSA-2018-0016.html<br \/>\nSistemas Afectados:<br \/>\nVMware vSphere ESXi<br \/>\nVMware Workstation Pro\/Player<br \/>\nVMware Fusion<\/p>\n<p>I. Descripci\u00f3n<br \/>\nVMware ha lanzado actualizaciones de seguridad para abordar vulnerabilidades en VMware ESXi, Workstation y Fusion. Un atacante podr\u00eda aprovechar estas vulnerabilidades para obtener informaci\u00f3n confidencial.<\/p>\n<p>II. Impacto<br \/>\nVMware ESXi, Workstation y Fusion contienen varias vulnerabilidades de lectura fuera de l\u00edmites en el traductor de sombreado. La explotaci\u00f3n exitosa de estos problemas puede llevar a la divulgaci\u00f3n de informaci\u00f3n o puede permitir que los atacantes con privilegios de usuario normales bloqueen sus m\u00e1quinas virtuales.<br \/>\nLa columna\u00a0 de la siguiente tabla enumera la acci\u00f3n requerida para remediar la vulnerabilidad en cada lanzamiento, si hay una soluci\u00f3n disponible.<\/p>\n<p>&nbsp;<\/p>\n<table class=\"egt\" bgcolor=\"#DFDFDF\">\n<tbody>\n<tr bgcolor=\"#8EC8F2\">\n<th>Producto de VMware<\/th>\n<th>version del producto<\/th>\n<th>Que se ejecuta en<\/th>\n<th>Gravedad<\/th>\n<th>Reemplace con \/ aplique el parche<\/th>\n<th>Mitigaci\u00f3n \/ Soluci\u00f3n<\/th>\n<\/tr>\n<tr>\n<td>ESXi<\/td>\n<td>6.7<\/td>\n<td>Any<\/td>\n<td>Important<\/td>\n<td>ESXi670-201806401-BG<\/td>\n<td>None<\/td>\n<\/tr>\n<tr>\n<td>ESXi<\/td>\n<td>6.5<\/td>\n<td>Any<\/td>\n<td>N\/A<\/td>\n<td>not affected<\/td>\n<td>N\/A<\/td>\n<\/tr>\n<tr>\n<td>ESXi<\/td>\n<td>6.0<\/td>\n<td>Any<\/td>\n<td>N\/A<\/td>\n<td>not affected<\/td>\n<td>N\/A<\/td>\n<\/tr>\n<tr>\n<td>ESXi<\/td>\n<td>5.5<\/td>\n<td>Any<\/td>\n<td>N\/A<\/td>\n<td>not affected<\/td>\n<td>N\/A<\/td>\n<\/tr>\n<tr>\n<td>Workstation<\/td>\n<td>14.x<\/td>\n<td>Any<\/td>\n<td>Important<\/td>\n<td>14.1.2<\/td>\n<td>None<\/td>\n<\/tr>\n<tr>\n<td>Fusion<\/td>\n<td>10.x<\/td>\n<td>OS X<\/td>\n<td>Important<\/td>\n<td>10.1.2<\/td>\n<td>None<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>La compa\u00f1\u00eda VMware ha publicado actualizaciones de software las cuales solucionan las vulnerabilidades de cada uno de los productos afectados.<br \/>\nhttps:\/\/www.vmware.com\/security\/advisories\/VMSA-2018-0016.html<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-07-03 actualizaciones de seguridad para VMware. Gravedad: Alta Fecha de publicaci\u00f3n: Julio, 2018 Fuente: https:\/\/www.vmware.com\/security\/advisories\/VMSA-2018-0016.html Sistemas Afectados: VMware vSphere ESXi VMware Workstation Pro\/Player VMware Fusion I. Descripci\u00f3n VMware ha lanzado actualizaciones de&#8230;<\/p>\n","protected":false},"author":4,"featured_media":965,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,96],"class_list":["post-1234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-vmware"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1234"}],"version-history":[{"count":3,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1234\/revisions"}],"predecessor-version":[{"id":1237,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1234\/revisions\/1237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/965"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}