{"id":3925,"date":"2024-10-02T09:08:01","date_gmt":"2024-10-02T14:08:01","guid":{"rendered":"https:\/\/cert.pa\/?p=3925"},"modified":"2024-10-02T09:08:02","modified_gmt":"2024-10-02T14:08:02","slug":"csirt-panama-aviso-2024-oct-2-vulnerabilidad-cve-2024-45519-en-zimbra","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3925","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2024-oct-2 Vulnerabilidad CVE-2024-45519 en Zimbra"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2024-oct-2 Vulnerabilidad CVE-2024-45519 en Zimbra<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: octubre 2, 2024<br>\u00daltima revisi\u00f3n: octubre 2, 2024<\/p>\n\n\n\n<p>Afectados:<br>Zimbra Veriones anteriores a 9.0.0 Patch 41<br>9.0.0 Patch 41<br>10.0.9<br>10.1.1<br>8.8.15 Patch 46<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Se ha detectado una vulnerabilidad cr\u00edtica en Zimbra Collaboration Suite. Esta vulnerabilidad le permitir\u00eda a un atacante la ejecuci\u00f3n remota de c\u00f3digo sin la necesidad de autenticaci\u00f3n.<\/p>\n\n\n\n<p>II. Detalle<br>Esta vulnerabilidad afecta especificamente al servicio Postjournal.<\/p>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar a versiones:<br>9.0.0 Patch 41<br>10.0.9<br>10.1.1<br>8.8.15 Patch 46 (aun cuenta con disponibilidad de parches hasta diciembre de 2024).<\/p>\n\n\n\n<p>Deshabilitar el servicio Postjournal si no es necesario.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2024-oct-2 Vulnerabilidad CVE-2024-45519 en ZimbraGravedad: AltaFecha de publicaci\u00f3n: octubre 2, 2024\u00daltima revisi\u00f3n: octubre 2, 2024 Afectados:Zimbra Veriones anteriores a 9.0.0 Patch 419.0.0 Patch 4110.0.910.1.18.8.15 Patch 46 I. Descripci\u00f3nSe ha detectado una vulnerabilidad&#8230;<\/p>\n","protected":false},"author":5,"featured_media":3069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[171,173,68,153],"class_list":["post-3925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizacion","tag-parche","tag-vulnerabilidades","tag-zimbra"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3925"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3925\/revisions"}],"predecessor-version":[{"id":3927,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3925\/revisions\/3927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/3069"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}