{"id":8834,"date":"2016-02-11T11:47:38","date_gmt":"2016-02-11T17:47:38","guid":{"rendered":"http:\/\/la-uno.com\/blog\/?p=8834"},"modified":"2016-02-11T11:47:38","modified_gmt":"2016-02-11T17:47:38","slug":"oracle-anuncia-otro-problema-de-seguridad-en-java","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2016\/02\/11\/oracle-anuncia-otro-problema-de-seguridad-en-java\/","title":{"rendered":"Oracle anuncia otro problema de seguridad en Java"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full aligncenter\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/scaredlady_contentfullwidth-e1448028831798-320x181.jpg\" alt=\"\" \/>Oracle acaba de anunciar otra vulnerabilidad que puede permitir a un atacante remoto tomar el control de un sistema Windows.<\/p>\n<p>La falla parece ser parte del proceso de instalaci\u00f3n en Java SE 6, 7 y 8 y es potencialmente cr\u00edtica aunque podr\u00eda ser algo dificil de explotar ya que solo est\u00e1 presente durante el proceso de instalaci\u00f3n, donde el atacante remoto deber\u00eda haber enga\u00f1ado al usuario a descargar archivos previo a correr la instalaci\u00f3n.<\/p>\n<p>&#8220;Aunque es relativamente complejo de explotar, esta vulnerabilidad puede resultar, si se explota correctamente, en un sistema comprometido sin sospecha por parte del usuario&#8221;.<\/p>\n<p>&#8220;Los usuarios que que ya corran Java SE 6, 7 u 8 no se ver\u00e1n afectados, pero aquellos que hayan descargado\u00a0versiones previas a 6u113, 7u97 u 8u73 para instalaciones posteriores deber\u00e1n descargar una versi\u00f3n actualizada que incluye el parche&#8221; dijo Oracle.<\/p>\n<p>Oracle ha confirmado que este bug no afecta a Java SE Advanced Enterprise, de cualquier forma esta es una falla de seguridad mas a la lista de problemas que ha tenido Java en los \u00faltimos a\u00f1os, lo que le ha costado presencia, ya que en los \u00faltimos a\u00f1os los navegadores han retirado el soporte para Java.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_8834\" class=\"pvc_stats all  \" data-element-id=\"8834\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Oracle acaba de anunciar otra vulnerabilidad que puede permitir a un atacante remoto tomar el control de un sistema Windows. La falla parece ser parte del proceso de instalaci\u00f3n en Java SE 6, 7 y 8 y es potencialmente cr\u00edtica aunque podr\u00eda ser algo dificil de explotar ya que solo est\u00e1 presente durante el proceso&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_8834\" class=\"pvc_stats all  \" data-element-id=\"8834\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":8835,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[37],"tags":[72,71],"class_list":["post-8834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","tag-java","tag-oracle"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2016\/02\/scaredlady_contentfullwidth-e1448028831798-320x181.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-2iu","jetpack-related-posts":[{"id":8241,"url":"https:\/\/la-uno.com\/blog\/2015\/08\/11\/hackeando-dropbox-google-drive-onedrive-y-otros-sin-necesidad-de-saber-nombre-de-usuario-y-contrasena\/","url_meta":{"origin":8834,"position":0},"title":"Hackeando Dropbox, Google Drive, OneDrive y otros sin necesidad de saber nombre de usuario y contrase\u00f1a.","author":"marco","date":"August 11, 2015","format":false,"excerpt":"\u00a0\u00a0 La compa\u00f1\u00eda Imperva ha mostrado un gran fallo de seguridad en Dropbox, GoogleDrive, OneDrive y otros servicios de almacenamiento en la nube que permite al atacante tener acceso a los archivos e incluso instalar malware sin siquiera tener el nombre de usuario y contrase\u00f1a. El problema de seguridad se\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/08\/IMG_0553.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/08\/IMG_0553.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/08\/IMG_0553.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5714,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/21\/inception-malware-de-pelicula\/","url_meta":{"origin":8834,"position":1},"title":"Inception, malware \u201cde pel\u00edcula\u201d","author":"marco","date":"December 21, 2014","format":false,"excerpt":"Malware por aqu\u00ed, malware por all\u00e1, muy constantes son las apariciones de estos c\u00f3digos da\u00f1inos, conocidos por ser programas que tienen como \u00fanico prop\u00f3sito el da\u00f1ar nuestro ordenador o para simplemente espiar al usuario llevando la cuenta desde que iniciamos en \u00e9l, las p\u00e1ginas que visitamos, siguiendo toda la rutina\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5625,"url":"https:\/\/la-uno.com\/blog\/2014\/11\/04\/subdominios-abandonados-representan-un-riesgo-de-seguridad-para-las-empresas\/","url_meta":{"origin":8834,"position":2},"title":"Subdominios abandonados representan un riesgo de seguridad para las empresas","author":"marco","date":"November 4, 2014","format":false,"excerpt":"Cuando las empresas olvidan desactivar los subdominios que ya no est\u00e1n siendo usados en sus servicios, \u00e9stas crean un vaci\u00f3 legal a explotar por los atacantes. Y debido a que muchos proveedores de servicios no validan correctamente la propiedad de los subdominios se\u00f1alados en sus servidores, los atacantes pueden crear\u2026","rel":"","context":"In &quot;Certificados&quot;","block_context":{"text":"Certificados","link":"https:\/\/la-uno.com\/blog\/category\/certificados\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10582,"url":"https:\/\/la-uno.com\/blog\/2017\/10\/16\/que-es-krack-como-es-que-soy-vulnerable-como-me-puedo-proteger\/","url_meta":{"origin":8834,"position":3},"title":"Que es KRACK? como es que soy vulnerable? como me puedo proteger?","author":"marco","date":"October 16, 2017","format":false,"excerpt":"EL dia de ayer se di\u00f3 la noticia sobre la vulnerabilidad presente en pr\u00e1cticamente todo dispositivo que use WiFi, la raz\u00f3n?, es que el protocolo WPA2 que se usa no solo para cifrar la contrase\u00f1a sino todo el tr\u00e1fico entre el Access Point y el cliente (celular, tablet, computadora, smartwatch)\u2026","rel":"","context":"In &quot;Android&quot;","block_context":{"text":"Android","link":"https:\/\/la-uno.com\/blog\/category\/mobile\/android\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":7599,"url":"https:\/\/la-uno.com\/blog\/2015\/04\/28\/7599\/","url_meta":{"origin":8834,"position":4},"title":"Una nueva falla de seguridad\u2026","author":"marco","date":"April 28, 2015","format":false,"excerpt":"Una nueva falla de seguridad se ha descubierto, es de tipo XSS,\u00a0y afecta a la ultima versi\u00f3n de WordPress que desde el pasado jueves est\u00e1 disponible, la versi\u00f3n 4.2. Debido a esta falla que tambi\u00e9n afecta a las versiones anteriores, el atacante puede inyectar un c\u00f3digo JavaScript malicioso en los\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/04\/wp-light-hi-2048x1536.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3058,"url":"https:\/\/la-uno.com\/blog\/2014\/09\/25\/fallo-de-seguridad-en-bash-deja-a-linux-unix-os-x-y-otros-vulnerables\/","url_meta":{"origin":8834,"position":5},"title":"Fallo de seguridad en BASH deja a Linux, Unix, OS X y otros vulnerables","author":"marco","date":"September 25, 2014","format":false,"excerpt":"\u00a0 Ayer se anunci\u00f3 un problema de seguridad que tiene BASH\u00a0una terminal en Unix y sistemas operativos compatibles con\u00a0POSIX\u00a0y que es la terminal por defecto de muchas distribuciones de Linux e incluso cuando no est\u00e1 por defecto viene instalada. Y es que BASH es la terminal mas popular en Unix.\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/shellshock-rob-graham-twitter.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/8834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=8834"}],"version-history":[{"count":1,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/8834\/revisions"}],"predecessor-version":[{"id":8836,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/8834\/revisions\/8836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/8835"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=8834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=8834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=8834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}