{"id":1265,"date":"2018-08-17T13:16:51","date_gmt":"2018-08-17T18:16:51","guid":{"rendered":"https:\/\/cert.pa\/?p=1265"},"modified":"2018-08-17T13:16:51","modified_gmt":"2018-08-17T18:16:51","slug":"csirt-panama-aviso-2018-08-16-l1tf-foreshadow","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1265","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-08-16 L1TF \/ Foreshadow"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-08-16 L1TF \/ Foreshadow<\/p>\n<p>Gravedad: Cr\u00edtica<br \/>\nFecha de publicaci\u00f3n: 16 agosto 2018<br \/>\nFecha de modificaci\u00f3n: 16 agosto 2018<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nFuente: Segu-Info, Red Hat<\/p>\n<p>Sistemas Afectados<br \/>\n\u2022 Microprocesadores x86 del fabricante Intel.<\/p>\n<p>I. Descripci\u00f3n<br \/>\nLa vulnerabilidad denominada \u201cTerminal Fault\u201d (abreviado L1TF) o tambi\u00e9n conocida como \u201cForeshadow\u201d, es un problema en la implementaci\u00f3n de hardware de microprocesadores similar a las vulnerabilidades \u201cSpectre\u201d y \u201cMeltdown\u201d que afectan microprocesadores x86 fabricados por Intel. Atacantes sin privilegios podr\u00edan tomar ventaja de L1TF para evadir las restricciones de seguridad de la memoria para ganar acceso a los datos almacenados en memoria. Existen tres variantes de Foreshadow:<\/p>\n<p>1. Afectaci\u00f3n en \u201cSoftware Guard Extensions\u201d (SGX) de Intel.<br \/>\n2. Afectaci\u00f3n de sistema operativo y modo de administraci\u00f3n de sistema.<br \/>\n3. Afectaci\u00f3n de programas hypervisor (virtualizaci\u00f3n).<\/p>\n<p>Para mitigar la vulnerabilidad se deben aplicar las actualizaciones de seguridad del sistema operativo, el programa de virtualizaci\u00f3n y\/o el fabricante Intel.<\/p>\n<p>Para mayor informaci\u00f3n, referirse a la &#8220;secci\u00f3n III. Referencia a soluciones, herramientas e informaci\u00f3n&#8221;.<\/p>\n<p>II. Impacto<br \/>\nComplejidad de Acceso: Alta.<br \/>\nAutenticaci\u00f3n: No requerida para explotarla.<br \/>\nTipo de impacto: Compromiso parcial o total del sistema.<\/p>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br \/>\na. https:\/\/blog.segu-info.com.ar\/2018\/08\/l1tf-foreshadow-nueva-vulnerabilidad-en.html<br \/>\nb. https:\/\/access.redhat.com\/security\/vulnerabilities\/L1TF<br \/>\nc. https:\/\/www.redhat.com\/en\/blog\/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know<br \/>\nd. https:\/\/access.redhat.com\/security\/cve\/cve-2018-3620<br \/>\ne. https:\/\/access.redhat.com\/security\/cve\/cve-2018-3646<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nAutoridad Nacional para la Innovaci\u00f3n Gubernamental<br \/>\nE-mail: info@cert.pa<br \/>\nWeb: http:\/\/www.cert.pa<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-08-16 L1TF \/ Foreshadow Gravedad: Cr\u00edtica Fecha de publicaci\u00f3n: 16 agosto 2018 Fecha de modificaci\u00f3n: 16 agosto 2018 \u00daltima revisi\u00f3n: Revisi\u00f3n A. Fuente: Segu-Info, Red Hat Sistemas Afectados \u2022 Microprocesadores x86 del&#8230;<\/p>\n","protected":false},"author":4,"featured_media":295,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1265"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1265\/revisions"}],"predecessor-version":[{"id":1266,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1265\/revisions\/1266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/295"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}