{"id":791,"date":"2016-07-13T15:16:47","date_gmt":"2016-07-13T20:16:47","guid":{"rendered":"https:\/\/cert.pa\/?p=791"},"modified":"2016-07-14T08:18:49","modified_gmt":"2016-07-14T13:18:49","slug":"boletines-de-seguridad-para-productos-adobe","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=791","title":{"rendered":"Bolet\u00ednes de Seguridad para productos Adobe"},"content":{"rendered":"<p style=\"text-align: justify;\">CSIRT Panam\u00e1 Aviso 2016-07- Bolet\u00ednes de Seguridad para productos Adobe<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Julio 13, 2016<br \/>\nFecha de modificaci\u00f3n: Julio 13, 2016<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nFuente: Bolet\u00edn de Seguridad de Adobe<\/p>\n<p>Sistemas Afectados<\/p>\n<p>Adobe XMP Toolkit para Java<br \/>\nAdobe Flash Player para Windows, Macintosh y Linux<br \/>\nAdobe Acrobat y Reader para Windows y Macintosh.<\/p>\n<p>I. Descripci\u00f3n<br \/>\nLa empresa Adobe ha liberado tres (3) bolet\u00ednes de seguridad[1,2,3] para los productos Adobe XMP Toolkit para Java, Adobe Flash Player y Adobe Reader. El bolet\u00edn relacionado al Adobe XMP Toolkit soluciona una vulnerabilidad que podr\u00eda producir una divulgaci\u00f3n de informaci\u00f3n. La misma esta asociada a un problema con el manejo de entidades externas en XML.\u00a0 El segundo y tercer bolet\u00edn de seguridad, asociado los producto Adobe Flash Player y Adobe Acrobat Reader, respectivamente; soluciona m\u00faltiples vulnerabilidades que podr\u00edan permitir a un atacante tomar control de un sistema afectado. CSIRT Panama recomienda a los administradores revisar estos bolet\u00ednes de seguridad y aplicar las actualizaciones en sus sistemas.<\/p>\n<p>II. Impacto<br \/>\nLa explotaci\u00f3n de estas vulnerabilidades podr\u00edan permitir a un atacante tomar control de un sistema afectado.<\/p>\n<p>III. Referencia a soluciones, herramientas\u00a0 e informaci\u00f3n<br \/>\n[1] https:\/\/helpx.adobe.com\/security\/products\/xmpcore\/apsb16-24.html<br \/>\n[2] https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb16-25.html<br \/>\n[3] https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb16-26.html<\/p>\n<p>VI. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2016-07- Bolet\u00ednes de Seguridad para productos Adobe Gravedad: Alta Fecha de publicaci\u00f3n: Julio 13, 2016 Fecha de modificaci\u00f3n: Julio 13, 2016 \u00daltima revisi\u00f3n: Revisi\u00f3n A. Fuente: Bolet\u00edn de Seguridad de Adobe Sistemas&#8230;<\/p>\n","protected":false},"author":4,"featured_media":59,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[27,23,8,68],"class_list":["post-791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-adobe-flash-player","tag-adobe-reader","tag-avisos","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=791"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/791\/revisions"}],"predecessor-version":[{"id":792,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/791\/revisions\/792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/59"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}