{"id":603,"date":"2016-01-29T08:17:21","date_gmt":"2016-01-29T13:17:21","guid":{"rendered":"https:\/\/cert.pa\/?p=603"},"modified":"2016-02-02T08:21:00","modified_gmt":"2016-02-02T13:21:00","slug":"vulnerabilidad-alta-en-openssl","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=603","title":{"rendered":"Vulnerabilidad alta en OpenSSL"},"content":{"rendered":"<p style=\"text-align: justify;\">CSIRT Panam\u00e1 Aviso 2016-01- Vulnerabilidad alta en OpenSSL<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Enero 29, 2016<br \/>\nFecha de modificaci\u00f3n: Enero 29, 2016<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nFuente: OpenSSL<\/p>\n<p style=\"text-align: justify;\">Sistemas Afectados<br \/>\nOpenSSL versi\u00f3n 1.0.2, 1.0.2a, 1.0.2b, 1.0.2c, 1.0.2d, 1.0.2e<\/p>\n<p style=\"text-align: justify;\">I. Descripci\u00f3n<br \/>\nLa vulnerabilidad de severidad alta permite que atacantes puedan obtener\u00a0la llave que descifra las comunicaciones seguras en HTTPS y otros\u00a0canales de la Capa de Transporte de Seguridad (TLS por sus siglas en\u00a0ingl\u00e9s).<\/p>\n<p style=\"text-align: justify;\">II.Mitigaci\u00f3n<br \/>\nLas personas que est\u00e9n utilizando OpenSSL versi\u00f3n 1.0.2 deben actualizar<br \/>\na la versi\u00f3n 1.0.2f.<br \/>\nEs importante recalcar que el soporte para la versi\u00f3n 1.0.1 terminar\u00e1 en\u00a0diciembre de 2016 y el soporte de las versiones 0.9.8 y 1.0.0 terminaron<br \/>\nen diciembre de 2015. Esto significa que no se tendr\u00e1 disponibilidad a\u00a0arreglos de seguridad al encontrarse alguna vulnerabilidad.<\/p>\n<p style=\"text-align: justify;\">II. Impacto<br \/>\nComplejidad de Acceso: Media.<br \/>\nAutenticaci\u00f3n: No requerida para explotarla.<br \/>\nTipo de impacto: P\u00e9rdida de la confidencialidad en las comunicaciones\u00a0HTTPS.<\/p>\n<p style=\"text-align: justify;\">III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<ul style=\"text-align: justify;\">\n<li>https:\/\/www.openssl.org\/news\/secadv\/20160128.txt<\/li>\n<li>https:\/\/www.openssl.org\/news\/cl102.txt<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">IV. Informaci\u00f3n de contacto<\/p>\n<p style=\"text-align: justify;\">CSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/www.cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2016-01- Vulnerabilidad alta en OpenSSL Gravedad: Alta Fecha de publicaci\u00f3n: Enero 29, 2016 Fecha de modificaci\u00f3n: Enero 29, 2016 \u00daltima revisi\u00f3n: Revisi\u00f3n A. Fuente: OpenSSL Sistemas Afectados OpenSSL versi\u00f3n 1.0.2, 1.0.2a, 1.0.2b,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":594,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[8,18],"class_list":["post-603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos","tag-openssl"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=603"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/603\/revisions"}],"predecessor-version":[{"id":605,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/603\/revisions\/605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/594"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}