{"id":2232,"date":"2020-07-06T16:29:33","date_gmt":"2020-07-06T21:29:33","guid":{"rendered":"https:\/\/cert.pa\/?p=2232"},"modified":"2020-07-06T16:29:33","modified_gmt":"2020-07-06T21:29:33","slug":"csirt-panama-aviso-2020-07-6-apache-actualizacion-de-seguridad-de-apache","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2232","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-07-6 Apache: Actualizaci\u00f3n de seguridad de Apache."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1\nAviso 2020-07-6 Apache: Actualizaci\u00f3n de seguridad de Apache. <\/p>\n\n\n\n<p>Gravedad: Media&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Vulnerabilidad: CVE-2020-11996 \/ CVE-2020-9494<\/p>\n\n\n\n<p>Fecha de publicaci\u00f3n: Julio 6, 2020<br>\n\u00daltima revisi\u00f3n: Julio 6, 2020<br>\nPortal: https:\/\/apache.org<\/p>\n\n\n\n<p>Sistemas Afectados: Diversos productos afectados. <\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Descripci\u00f3n<\/strong><\/li><\/ol>\n\n\n\n<p>Vulnerabilidades en la plataforma Apache referente\na dos vulnerabilidades que afectan a Apache Tomcat y Apache Traffic Server.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Impacto<\/strong><\/li><\/ol>\n\n\n\n<p><strong>Vulnerabilidad:\nCVE-2020-11996<\/strong><\/p>\n\n\n\n<p>Utilizando peticiones HTTP\/2 especialmente\ndise\u00f1adas, es posible elevar el uso de la CPU por unos cuantos segundos. Si se\nenv\u00edan suficientes peticiones al sistema afectado, es posible causar una\ndenegaci\u00f3n de servicios.<\/p>\n\n\n\n<p>Los Productos Afectados son: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apache\nTomcat entre las versiones 10.0.0-M1 y 10.0.0-M5.<\/li><li>Apache\nTomcat entre las versiones 9.0.0.M1 y 9.0.35.<\/li><li>Apache\nTomcat entre las versiones 8.5.0 y 8.5.55.<\/li><\/ul>\n\n\n\n<p><strong>Vulnerabilidad:\nCVE-2020-9494<\/strong><\/p>\n\n\n\n<p>Apache Traffic Server es vulnerable a ciertos tipos\nde marcos de cabeceras HTTP\/2, que podr\u00edan hacer que el servidor asigne una\ngran cantidad de memoria y haga girar el hilo.<\/p>\n\n\n\n<p>Los Productos Afectados son: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apache\nTraffic Server entre las versiones 6.0.0 y 6.2.3.<\/li><li>Apache\nTraffic Server entre las versiones 7.0.0 y 7.1.10.<\/li><li>Apache\nTraffic Server entre las versiones 8.0.0 y 8.0.7.<\/li><\/ul>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e\ninformaci\u00f3n<\/strong><strong><\/strong><\/p>\n\n\n\n<p>De acuerdo a las vulnerabilidades, mediante su\nsitio oficial (https:\/\/projects.apache.org\/releases.html) debes actualizar los\nproductos a las siguientes versiones. <\/p>\n\n\n\n<p><strong>Vulnerabilidad:\nCVE-2020-11996<\/strong><\/p>\n\n\n\n<p>Actualizar a la versi\u00f3n 10.0.0-M6, 9.0.36 o 8.5.56\n(o superiores).<\/p>\n\n\n\n<p><strong>Vulnerabilidad:\nCVE-2020-9494<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Para usuarios con la versi\u00f3n 6.x, actualizar a la\n7.1.11, 8.0.8 o superior.<\/li><li>Para usuarios con la versi\u00f3n 7.x, actualizar a la\n7.1.11 o superior.<\/li><li>Para usuarios con la versi\u00f3n 8.x, actualizar a la\n8.0.8 o superior.<\/li><\/ul>\n\n\n\n<p><strong>Fuentes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Common Vulnerabilities and\nExposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-11996\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-11996<\/a><\/li><li>Common Vulnerabilities and\nExposures (CVE). Recopilado en: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-9494<\/li><li>CSIRT Chile. 3 de julio del 2020. Vulnerabilidades.\nRecopilado en: https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00259-01\/<\/li><\/ul>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion\nGubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-07-6 Apache: Actualizaci\u00f3n de seguridad de Apache. Gravedad: Media&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vulnerabilidad: CVE-2020-11996 \/ CVE-2020-9494 Fecha de publicaci\u00f3n: Julio 6, 2020 \u00daltima revisi\u00f3n: Julio 6, 2020 Portal: https:\/\/apache.org Sistemas Afectados: Diversos productos afectados. Descripci\u00f3n&#8230;<\/p>\n","protected":false},"author":4,"featured_media":2235,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,125,126],"class_list":["post-2232","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-apacha","tag-aviso-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2232"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2232\/revisions"}],"predecessor-version":[{"id":2234,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2232\/revisions\/2234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/2235"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}