{"id":779,"date":"2016-06-17T09:28:05","date_gmt":"2016-06-17T14:28:05","guid":{"rendered":"https:\/\/cert.pa\/?p=779"},"modified":"2016-06-17T09:28:05","modified_gmt":"2016-06-17T14:28:05","slug":"vulnerabilidad-critica-en-adobe-flash-player","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=779","title":{"rendered":"Vulnerabilidad cr\u00edtica en Adobe Flash Player"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2016-06 Aviso de Seguridad para Adobe Flash Player<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Junio 14, 2016<br \/>\nFecha de modificaci\u00f3n: Junio 16, 2016<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n B.<\/p>\n<p>Sistemas Afectados<br \/>\nAdobe Flash Player para Windows, Macintosh, Linux y Chrome OS<\/p>\n<p style=\"text-align: justify;\">I. Descripci\u00f3n<\/p>\n<p style=\"text-align: justify;\">La empresa Adobe ha publicado un aviso de seguridad acerca de unavulnerabilidad encontrada en las versiones de Adobe Flash Player\u00a021.0.0.242 y versiones anteriores[1]. La explotaci\u00f3n de esta<br \/>\nvulnerabilidad podr\u00eda ocasionar una falla en el sistema y permitir que\u00a0un atacante remoto tome control de un sistema afectado.\u00a0La empresa Adobe tiene conocimiento de esta vulnerabilidad[2] y de su\u00a0utilizaci\u00f3n en ataques de d\u00eda cero, sin embargo a\u00fan no ha sido\u00a0liberado el parche correspondiente a esta vulnerabilidad. Seg\u00fan la\u00a0empresa, solucionara esta vulnerabilidad en su actualizaci\u00f3n mensual\u00a0de seguridad, el d\u00eda 16 de junio.[3]<\/p>\n<p>Actualizaci\u00f3n 17\/06\/2016<br \/>\nAdobe ha publicado una actualizaci\u00f3n de seguridad para Adobe Flash\u00a0Player con el fin de solucionar esta vulnerabilidad[4]. Se recomienda a los administradores evaluar la utilizaci\u00f3n de Adobe<br \/>\nFlash Player en el entorno de su organizaci\u00f3n y aplicar las\u00a0actualizaciones correspondientes.<\/p>\n<p>II. Impacto<br \/>\nLa explotaci\u00f3n de esta vulnerabilidad podr\u00eda ocasionar una falla en el\u00a0sistema y permitir que un atacante remoto tome control de un sistema\u00a0afectado.<\/p>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n.<\/p>\n<ol>\n<li>https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsa16-03.html<\/li>\n<li>https:\/\/securelist.com\/blog\/research\/75082\/cve-2016-4171-adobe-flash-zero-day-used-in-targeted-attacks\/<\/li>\n<li>https:\/\/blogs.adobe.com\/psirt\/?p=1367<\/li>\n<li>https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb16-18.htm<\/li>\n<\/ol>\n<p>IV. Informaci\u00f3n de contacto<\/p>\n<p>CSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: http:\/\/www.cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2016-06 Aviso de Seguridad para Adobe Flash Player Gravedad: Alta Fecha de publicaci\u00f3n: Junio 14, 2016 Fecha de modificaci\u00f3n: Junio 16, 2016 \u00daltima revisi\u00f3n: Revisi\u00f3n B. Sistemas Afectados Adobe Flash Player para&#8230;<\/p>\n","protected":false},"author":4,"featured_media":594,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[78,8,79],"class_list":["post-779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-adobe","tag-avisos","tag-flash"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=779"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/779\/revisions"}],"predecessor-version":[{"id":780,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/779\/revisions\/780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/594"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}