{"id":1006,"date":"2014-07-25T10:47:27","date_gmt":"2014-07-25T08:47:27","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1006"},"modified":"2014-07-25T10:52:47","modified_gmt":"2014-07-25T08:52:47","slug":"publicacion-del-parche-3-para-mcafee-email-gateway-7-5","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2014\/publicacion-del-parche-3-para-mcafee-email-gateway-7-5\/","title":{"rendered":"Publicaci\u00f3n del parche 3 para McAfee Email Gateway 7.5"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">McAfee ha publicado el parche 3 para sus appliance McAfee Email Gateway 7.5, tanto f\u00edsicos como virtuales.<\/p>\n<p class=\"western\" align=\"left\">Este hotfix a\u00f1ade nuevas funcionalidades y soluciona problemas reportados en versiones anteriores:<\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\">Vulnerabilidades (total:9, nuevas:3)<\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\">Problemas de bajo impacto (total:84, nuevas:73)<\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #008000;\"><span style=\"text-decoration: underline;\"><b><br \/>\n<\/b><\/span><\/span><span style=\"color: #800000;\"><span style=\"text-decoration: underline;\"><br \/>\nVulnerabilidades <\/span><\/span><span style=\"color: #800000;\"><span style=\"text-decoration: underline;\">resueltas<\/span><\/span><span style=\"color: #800000;\">:<\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n de Oracle Outside en una librer\u00eda utilizada en el appliance solventa la vulnerabilidad <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5879\" target=\"_blank\">CVE-2013-5879<\/a>.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n del paquete BIND solventa la vulnerabilidad <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0591\" target=\"_blank\">CVE-2014-0591<\/a>.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n del paquete gnutls solventa la vulnerabilidad <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0092\" target=\"_blank\">CVE-2014-0092<\/a>.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Resuelve diversas vulnerabilidades en la interfaz del usuario.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n del paquete OpenSSL solventa las vulnerabilidades <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6449\" target=\"_blank\">CVE-2013-6449<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6450\" target=\"_blank\">CVE-2013-6450<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-4353\" target=\"_blank\">CVE-2013-4353<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0076\" target=\"_blank\">CVE-2014-0076<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0160\" target=\"_blank\">CVE-2014-0160<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0224\" target=\"_blank\">CVE-2014-0224<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0221\" target=\"_blank\">CVE-2014-0221<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0195\" target=\"_blank\">CVE-2014-0195<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0198\" target=\"_blank\">CVE-2014-0198<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2010-5298\" target=\"_blank\">CVE-2010-5298<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-3470\" target=\"_blank\">CVE-2014-3470<\/a>.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n de la configuraci\u00f3n de carga y guardado de la interfaz del usuario solventa las vulnerabilidades <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-7103\" target=\"_blank\">CVE-2013-7103<\/a> y <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-7104\" target=\"_blank\">CVE-2013-7104<\/a> por las cuales un administrador autenticado podr\u00eda ejecutar acciones arbitrarias <\/span><span style=\"font-family: Arial, sans-serif;\">mediante<\/span><span style=\"font-family: Arial, sans-serif;\"> peticiones HTTP manipuladas.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n del sistemas de informes para filtrar correctamente campos de la interfaz del usuario. Esto solventa la vulnerabilidad <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-7092\" target=\"_blank\">CVE-2013-7092<\/a><\/span> por la cual un usuario de informes autenticado podr\u00eda realizar inyecciones SQL mediante <span style=\"font-family: Arial, sans-serif;\">peticiones HTTP manipuladas.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n de la interfaz de Secure Web Mail para solventar vulnerabilidades de publicaci\u00f3n de datos de usuario e inyecci\u00f3n de cabeceras HTTP.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Actualizaci\u00f3n de la configuraci\u00f3n NTP para evitar que el appliance pueda ser explotado durante un ataque DDOS mediante la vulnerabilidad <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5211\" target=\"_blank\">CVE-2013-5211<\/a> <\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\">El resto de problemas solventados a nivel de correo, sistema operativo y otros puede consultarse en el documento <a href=\"https:\/\/kc.mcafee.com\/resources\/sites\/MCAFEE\/content\/live\/PRODUCT_DOCUMENTATION\/25000\/PD25312\/en_US\/MEG_7_5_3-3016_105_readme_en_US_RTW.pdf\" target=\"_blank\">PD25312<\/a><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #008000;\"><span style=\"font-family: Arial, sans-serif;\"><b><span style=\"text-decoration: underline;\">REQUISITOS DE INSTALACI\u00d3N<\/span>:<\/b><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-family: Arial, sans-serif;\">Este hotfix puede instalarse sobre la versi\u00f3n 7.5 de McAfee Email Gateway as\u00ed como sobre las versiones 7.5.1 y 7.5.2.<\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #008000;\"><span style=\"font-family: Arial, sans-serif;\"><b><span style=\"text-decoration: underline;\">VERSIONES SUSTITUIDAS<\/span>:<\/b><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-family: Arial, sans-serif;\">Este hotfix sustituye los hotfix siguientes:<\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Hotfix 7.5h938406<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Hotfix 7.5h948770<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Hotfix 7.5h952384<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Hotfix 7.5h960401<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Hotfix 7.5h965187<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\">Hotfix 7.5h968383<\/span><\/p>\n<p class=\"western\" align=\"left\">\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #008000;\"><span style=\"font-family: Arial, sans-serif;\"><b><span style=\"text-decoration: underline;\">ACCIONES DURANTE LA INSTALACI\u00d3N<\/span>:<\/b><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-family: Arial, sans-serif;\">Se cerrar\u00e1 la sesi\u00f3n del usuario<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-family: Arial, sans-serif;\">Se reiniciar\u00e1 el appliance<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #008000;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"color: #000000;\"><span style=\"text-decoration: underline;\"><b>Nota<\/b><\/span><\/span><span style=\"color: #000000;\"><b>:<\/b><\/span><span style=\"color: #000000;\">McAfee <\/span><span style=\"color: #000000;\">ha calificado esta actualizaci\u00f3n como <\/span><span style=\"color: #800000;\"><span style=\"text-decoration: underline;\"><b>Recomendado<\/b><\/span><\/span><span style=\"color: #000000;\">. Aplique esta actualizaci\u00f3n <\/span><span style=\"color: #000000;\">cuando le sea <\/span><span style=\"color: #000000;\">posible.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\">Para realizar la descarga del parche puede hacerlo desde la <a href=\"http:\/\/www.mcafee.com\/es\/downloads\/downloads.aspx\" target=\"_blank\">p\u00e1gina de descargas de McAfee<\/a> utilizando su Grant Number o N\u00famero de Concesi\u00f3n.<\/span><\/p>\n<p class=\"western\" align=\"left\"><b><span style=\"color: #0000ff;\"><span lang=\"es-ES\">SATINFO<\/span><\/span><span lang=\"es-ES\">, <\/span><span lang=\"es-ES\">SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA\u00a0<\/span><span lang=\"es-ES\">2<\/span><span lang=\"es-ES\">5<\/span><span lang=\"es-ES\"> de <\/span><span lang=\"es-ES\">Ju<\/span><span lang=\"es-ES\">l<\/span><span lang=\"es-ES\">io\u00a0<\/span><span lang=\"es-ES\">de 201<\/span><span lang=\"es-ES\">4<\/span><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee ha publicado el parche 3 para sus appliance McAfee Email Gateway 7.5, tanto f\u00edsicos como virtuales. Este hotfix a\u00f1ade nuevas funcionalidades y soluciona problemas reportados en versiones anteriores: Vulnerabilidades (total:9, nuevas:3) Problemas de bajo impacto (total:84, nuevas:73) Vulnerabilidades resueltas: Actualizaci\u00f3n de Oracle Outside en una librer\u00eda utilizada en el appliance solventa la vulnerabilidad CVE-2013-5879. <a href='https:\/\/www.satinfo.es\/noticies\/2014\/publicacion-del-parche-3-para-mcafee-email-gateway-7-5\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[517,890,892],"tags":[589,590,105],"class_list":["post-1006","post","type-post","status-publish","format-standard","hentry","category-517","category-mcafee","category-todos","tag-mcafee-email-gateway-7-5","tag-meg-7-5","tag-parche-3","category-517-id","category-890-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1006"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1006\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}