{"id":3058,"date":"2014-09-25T09:34:09","date_gmt":"2014-09-25T15:34:09","guid":{"rendered":"http:\/\/la-uno.com\/blog\/?p=3058"},"modified":"2015-02-18T14:46:19","modified_gmt":"2015-02-18T20:46:19","slug":"fallo-de-seguridad-en-bash-deja-a-linux-unix-os-x-y-otros-vulnerables","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2014\/09\/25\/fallo-de-seguridad-en-bash-deja-a-linux-unix-os-x-y-otros-vulnerables\/","title":{"rendered":"Fallo de seguridad en BASH deja a Linux, Unix, OS X y otros vulnerables"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3070\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg\" alt=\"shellshock-rob-graham-twitter\" width=\"630\" height=\"354\" srcset=\"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg 630w, https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter-300x168.jpg 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/a><\/p>\n<p>Ayer se anunci\u00f3 un problema de seguridad que tiene <a href=\"http:\/\/es.wikipedia.org\/wiki\/Bash\" target=\"_blank\">BASH<\/a>\u00a0una terminal en Unix y sistemas operativos compatibles con\u00a0<a href=\"http:\/\/es.wikipedia.org\/wiki\/POSIX\" target=\"_blank\">POSIX<\/a>\u00a0y que es la terminal por defecto de muchas distribuciones de Linux e incluso cuando no est\u00e1 por defecto viene instalada. Y es que BASH es la terminal mas popular en Unix.<\/p>\n<p>El problema es que tiene un problema de seguridad que permite a los atacantes correr cualquier programa tan pronto como la shell empiece a funcionar. Pueden efectivamente tomar control de cualquier dispositivo en la red que corra bash, incluso si hay limites en los comandos que el usuario remoto puede usar. Ese es un gran problema cuando el Internet depende de esta shell para correr programas y scripts en las tareas diarias. Muchos servidores web solo pueden correr sus scripts en bash, por poner un ejemplo.<\/p>\n<p><a href=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/ByUMLSmCMAEihek.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3069\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/ByUMLSmCMAEihek.png\" alt=\"ByUMLSmCMAEihek\" width=\"544\" height=\"367\" srcset=\"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/ByUMLSmCMAEihek.png 544w, https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/ByUMLSmCMAEihek-300x202.png 300w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><\/a><\/p>\n<p>Ya existen parches para varias versiones de Linux (<a href=\"http:\/\/lists.centos.org\/pipermail\/centos\/2014-September\/146099.html\" target=\"_blank\">CentOS<\/a>, <a href=\"https:\/\/www.debian.org\/security\/2014\/dsa-3032\" target=\"_blank\">Debian<\/a>, <a href=\"https:\/\/access.redhat.com\/site\/solutions\/1207723\" target=\"_blank\">Redhat<\/a>), los grandes proveedores de servicios como Akamai ya han tomado acci\u00f3n. De cualquier manera, la edad del exploit sugiere que hay otros dispositivos conectados a Internet que pueden ser explotables. Algunos otros dispositivos est\u00e1n protegidos, ya que los dispositivos con una shell empotrada en BusyBox no son vulnerables.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3058\" class=\"pvc_stats all  \" data-element-id=\"3058\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Ayer se anunci\u00f3 un problema de seguridad que tiene BASH\u00a0una terminal en Unix y sistemas operativos compatibles con\u00a0POSIX\u00a0y que es la terminal por defecto de muchas distribuciones de Linux e incluso cuando no est\u00e1 por defecto viene instalada. Y es que BASH es la terminal mas popular en Unix. El problema es que tiene&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3058\" class=\"pvc_stats all  \" data-element-id=\"3058\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":3070,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[50,34,66,37],"tags":[],"class_list":["post-3058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple","category-internet","category-linux","category-seguridad"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-Nk","jetpack-related-posts":[{"id":10865,"url":"https:\/\/la-uno.com\/blog\/2018\/01\/03\/intel-en-graves-problemas-por-fallo-de-seguridad-en-sus-micros\/","url_meta":{"origin":3058,"position":0},"title":"Intel en graves problemas por fallo de seguridad en sus micros","author":"marco","date":"January 3, 2018","format":false,"excerpt":"Intel tiene un serio problema encima. B\u00e1sicamente todos los micros fabricados durante la \u00faltima d\u00e9cada tienen un fallo de seguridad marca ACME. El fallo de seguridad implica que cualquier programa podr\u00eda acceder a espacio de memoria reservado para el Kernel, lo que descubriria informaci\u00f3n sensible en el equipo afectado. Lo\u2026","rel":"","context":"In &quot;Seguridad&quot;","block_context":{"text":"Seguridad","link":"https:\/\/la-uno.com\/blog\/category\/seguridad\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/01\/Gen6CoreBadge.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/01\/Gen6CoreBadge.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/01\/Gen6CoreBadge.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/01\/Gen6CoreBadge.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/01\/Gen6CoreBadge.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/01\/Gen6CoreBadge.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11424,"url":"https:\/\/la-uno.com\/blog\/2019\/10\/02\/lockdown-seguridad-que-evitara-que-eches-a-perder-el-sistema\/","url_meta":{"origin":3058,"position":1},"title":"Lockdown, seguridad que evitara que eches a perder el sistema","author":"marco","date":"October 2, 2019","format":false,"excerpt":"Porque los desarrolladores del kernel linux saben que la vas a cajetear, porque saben que siempre encuentras una forma de echar a perder tu sistema, por eso se han inventado esto. No, la verdad es que es una medida de seguridad para que aplicaciones malintencionadas no puedan modificar el Kernel\u2026","rel":"","context":"In &quot;Linux&quot;","block_context":{"text":"Linux","link":"https:\/\/la-uno.com\/blog\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/02\/tux-linux.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":10762,"url":"https:\/\/la-uno.com\/blog\/2017\/11\/28\/grave-fallo-de-seguridad-en-macos-high-sierra-root-sin-pedir-contrasena-aqui-como-solucionarlo\/","url_meta":{"origin":3058,"position":2},"title":"Grave fallo de seguridad en macOS High Sierra, root sin pedir contrase\u00f1a!, aqui como solucionarlo","author":"marco","date":"November 28, 2017","format":false,"excerpt":"El sistema Operativo mas avanzado del mundo tiene un fallo de seguridad tan tonto que tumba por los suelos la afirmaci\u00f3n de ser el mas avanzado. macOS High Sierra tiene sus bases en UNIX, y como tal hace uso de los mecanimos de autenticaci\u00f3n y niveles de seguridad propios de\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/11\/unlock.gif?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5890,"url":"https:\/\/la-uno.com\/blog\/2015\/02\/13\/nadie-es-inmune\/","url_meta":{"origin":3058,"position":3},"title":"Nadie es inmune","author":"marco","date":"February 13, 2015","format":false,"excerpt":"Aunque Linux es un sistema minoritario en cuanto a computadoras personales para las empresas resulta una mejor alternativa, el 92.4% de los ordenadores m\u00e1s r\u00e1pidos del planeta ejecutan GNU\/Linux, y los riesgos a los que se enfrenta Windows en cuanto a seguridad puede que no est\u00e9n muy lejos. Y es\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/IMG_1076-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/IMG_1076-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/IMG_1076-1.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":8193,"url":"https:\/\/la-uno.com\/blog\/2015\/07\/30\/windows-10-tiene-serios-problemas-de-seguridad-con-microsoft\/","url_meta":{"origin":3058,"position":4},"title":"Windows 10 tiene serios problemas de seguridad&#8230; con Microsoft","author":"marco","date":"July 30, 2015","format":false,"excerpt":"Microsoft Windows 10, la versi\u00f3n mas reciente del sistema operativo para escritorio ha llegado\u00a0y con ello el escrutinio por parte de los usuarios t\u00e9cnicos y no t\u00e9cnicos, sobre todo de los \"legales\". La cosa esta as\u00ed: Microsoft Windows 10 viene con una licencia de uso como cualquier otro sistema operativo\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/la-uno.com\/blog\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/07\/video.yahootechmix.com%40103dddd1-6130-3baf-b80c-c934e1bf0459_FULL-702x336.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11089,"url":"https:\/\/la-uno.com\/blog\/2018\/04\/13\/preparate-para-ubuntu-18-04-bionic-beaver\/","url_meta":{"origin":3058,"position":5},"title":"Preparate para Ubuntu 18.04 Bionic Beaver","author":"marco","date":"April 13, 2018","format":false,"excerpt":"Ubuntu 18.04 est\u00e1 a la vuelta de la esquina; es hora de ir preparando el terreno para actualizar a la siguiente LTS de una de las distribuciones favoritas por los usuarios \"noveles\" de Linux. La fecha de lanzamiento es el 26 de Abril de 2018, su nombre clave es Bionic\u2026","rel":"","context":"In &quot;Linux&quot;","block_context":{"text":"Linux","link":"https:\/\/la-uno.com\/blog\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/reason-upgrade-1804-ubuntu-670x335.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/reason-upgrade-1804-ubuntu-670x335.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/04\/reason-upgrade-1804-ubuntu-670x335.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/3058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=3058"}],"version-history":[{"count":1,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/3058\/revisions"}],"predecessor-version":[{"id":3071,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/3058\/revisions\/3071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/3070"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=3058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=3058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=3058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}