{"id":293,"date":"2014-11-14T12:23:12","date_gmt":"2014-11-14T17:23:12","guid":{"rendered":"https:\/\/10.252.76.154\/?p=293"},"modified":"2015-09-29T16:46:31","modified_gmt":"2015-09-29T21:46:31","slug":"csirt-panama-aviso-2014-11-vulnerabilidad-schannel-cve-2014-6321","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=293","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2014-11\u2013 Vulnerabilidad Schannel (CVE-2014-6321)"},"content":{"rendered":"<p style=\"text-align: justify;\">CSIRT Panam\u00e1 Aviso 2014-11\u2013 Vulnerabilidad Schannel (CVE-2014-6321)<br \/>\nFecha de publicaci\u00f3n: Noviembre 14, 2014<br \/>\nFecha de modificaci\u00f3n: Noviembre 14, 2014<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nGravedad: Alta<br \/>\nFuente: NCCIC \/ US-CERT<\/p>\n<p style=\"text-align: justify;\">Sistemas afectados<\/p>\n<p style=\"text-align: justify;\">Las siguientes versiones de Windows:<\/p>\n<p style=\"text-align: justify;\">Microsoft Windows Server 2003 SP2<br \/>\nMicrosoft Windows Vista SP2<br \/>\nMicrosoft Windows Server 2008 SP2<br \/>\nMicrosoft Windows Server 2008 R2 SP1<br \/>\nMicrosoft Windows 7 SP1<br \/>\nMicrosoft Windows 8<br \/>\nMicrosoft Windows 8.1<br \/>\nMicrosoft Windows Server 2012<br \/>\nMicrosoft Windows Server 2012 R2<br \/>\nMicrosoft Windows RT<br \/>\nMicrosoft Windows RT 8.1<\/p>\n<p style=\"text-align: justify;\">Los sistemas operativos Microsoft Windows XP y Microsoft Windows 2000 tambi\u00e9n podr\u00edan ser afectados.<\/p>\n<p style=\"text-align: justify;\">Resumen<br \/>\nEs una vulnerabilidad cr\u00edtica en algunos sistemas operativos Microsoft Windows que podr\u00eda permitir a un atacante remoto ejecutar c\u00f3digo arbitrario mediante tr\u00e1fico de red especialmente dise\u00f1ado.<\/p>\n<p style=\"text-align: justify;\">I. Descripci\u00f3n<br \/>\nMicrosoft Secure Channel (Schannel) es un paquete de seguridad que provee Secure Socket Layer (SSL) y Transport Layer Securiy (TLS) en plataformas Microsoft Windows. Debido a una falla en Schannel, un atacante remoto podr\u00eda ejecutar c\u00f3digo arbitrario tanto en aplicaciones de servidor como de cliente. La explotaci\u00f3n es posible que ocurra sin autenticaci\u00f3n o v\u00eda un tr\u00e1fico de red no solicitado. Los parches de Microsoft usualmente son objeto de ingenier\u00eda inversa y los exploits son desarrollados en d\u00edas o semanas. Un usuario an\u00f3nimo en una publicaci\u00f3n de Pastebin ha amenazado en publicar un exploit el viernes 14 de noviembre de 2014.<\/p>\n<p style=\"text-align: justify;\">II. Impacto<br \/>\nEsta falla permite a un atacante remoto comprometer completamente los sistemas vulnerables mediante la ejecuci\u00f3n de c\u00f3digo arbitrario.<\/p>\n<p style=\"text-align: justify;\">IV. Recomendaciones<br \/>\nMicrosoft ha publicado el bolet\u00edn de seguridad MS14-066 para solucionar \u00e9sta vulnerabilidad en los sistemas operativos soportados.<\/p>\n<p style=\"text-align: justify;\">V. Referencia a Soluciones, Herramientas e Informaci\u00f3n<\/p>\n<ul style=\"text-align: justify;\">\n<li>http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6321<\/li>\n<li>https:\/\/technet.microsoft.com\/library\/security\/MS14-066<\/li>\n<li>http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa380123%28v=vs.85%29.aspx<\/li>\n<li>http:\/\/www.reddit.com\/r\/netsec\/comments\/2m1alz\/microsoft_security_bulletin_ms14066\/<\/li>\n<li>http:\/\/pastebin.com\/bsgX01dU<\/li>\n<li>http:\/\/adi.is\/winshock.txt<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">VI. Informaci\u00f3n de Contacto<br \/>\nCSIRT PANAMA<br \/>\nAutoridad Nacional para la Innovaci\u00f3n Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nWeb: https:\/\/www.cert.pa<\/p>\n<p style=\"text-align: justify;\">&#8212;&#8211;BEGIN PGP PUBLIC KEY BLOCK&#8212;&#8211;<br \/>\nVersion: GnuPG v2.0.17 (MingW32)<\/p>\n<p style=\"text-align: justify;\">mQENBE8C9KoBCAClkvrtdD08B1YgIntnK241GmWY7fRWtPn\/QIEG1+TLokEuOhw+<br \/>\nGq\/lK\/4NP9RzqpD57LcRUBiGgTmO\/5C9xkhVmxz2jid0h03fLorC84rAk2pOjr0i<br \/>\npbltETq9RCGhOWp13OV22x2yiIedBi05bzw3F+uLHhn9xKjmpBuZB6WO\/TuD52DH<br \/>\nKRZtwSvoaa61vL0bGnIf3lNGWkALWEC3lGBppby4D05N2FNfgfOFr1yOpxTaRaDh<br \/>\n4kOnoAEWVzppkTPyqSOkwXmgdma8D9yqD41Ffu8ypGTv+OOVO7jDq8tx9wVZEU+w<br \/>\npqBTzQcf0P0K7qO3igdHQxqHmqXsaJpbmvCBABEBAAG0KkNTSVJUIFBhbmFtYSAo<br \/>\nQ1NJUlQgUGFuYW1hKSA8aW5mb0BjZXJ0LnBhPokBOAQTAQIAIgUCTwL0qgIbDwYL<br \/>\nCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQ2YlXchbysSSPSQgAooUy3qSR\/YX2<br \/>\nH3USJ5VzrmnraHg5LIWRPIBD1PGrswjLE8hxdobPU\/uzi9LWnEcDscfFVKM\/K0Jt<br \/>\nbjeoESqCVFlpE0YXJWdDhy0m2WM410sDE2HVXbPhWGqrNeDb0VUV\/LWag1yYTj5w<br \/>\nkkxma4Tk5TqlhgL5su2PpjtTdFSHYD4N+4mu7g1GhRrrpz+u7ZRm3b\/WkAJg5FIg<br \/>\nU0MpPqUGAF5\/pc02ZB10FdxDwWyXAkwYUN+zfLiKzKOrBGkEw9+jvFGU+z76P9Zk<br \/>\n1XJIexpmkBYTxc+TOclhAp\/3HP4taoBHRMoR1q1YhdC++UgRSLmPLGn\/AB707JzN<br \/>\nQ80++q2kWQ==<br \/>\n=JUYg<br \/>\n&#8212;&#8211;END PGP PUBLIC KEY BLOCK&#8212;&#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2014-11\u2013 Vulnerabilidad Schannel (CVE-2014-6321) Fecha de publicaci\u00f3n: Noviembre 14, 2014 Fecha de modificaci\u00f3n: Noviembre 14, 2014 \u00daltima revisi\u00f3n: Revisi\u00f3n A. Gravedad: Alta Fuente: NCCIC \/ US-CERT Sistemas afectados Las siguientes versiones de&#8230;<\/p>\n","protected":false},"author":4,"featured_media":295,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[8,9],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos","tag-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=293"}],"version-history":[{"count":3,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/293\/revisions\/297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/295"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}