{"id":1047,"date":"2014-10-03T13:29:52","date_gmt":"2014-10-03T11:29:52","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1047"},"modified":"2014-10-03T13:29:52","modified_gmt":"2014-10-03T11:29:52","slug":"publicacion-de-hotfix-para-solventar-vulnerabilidad-shellshock-en-mcafee-email-gateway-7-5-y-mcafee-email-gateway-7-6","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2014\/publicacion-de-hotfix-para-solventar-vulnerabilidad-shellshock-en-mcafee-email-gateway-7-5-y-mcafee-email-gateway-7-6\/","title":{"rendered":"Publicaci\u00f3n de Hotfix para solventar vulnerabilidad ShellShock en McAfee Email Gateway 7.5 y McAfee Email Gateway 7.6"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">McAfee ha publicado los siguientes Hotfix para solventar la vulnerabilidad ShellShock en los appliance f\u00edsicos y virtuales McAfee Email Gateway (MEG):<\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Hotfix 7.6.2h1010246 para McAfee Email Gateway 7.6<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Hotfix 7.5.4h1010253 para McAfee Email Gateway 7.5<\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\"><span style=\"color: #800000;\"><span style=\"text-decoration: underline;\"><b><br \/>\n<\/b><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: medium;\"><span style=\"text-decoration: underline;\"><b>Vulnerabilidades resueltas<\/b><\/span><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: medium;\"><b>:<\/b><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Estos Hotfix actualizan el paquete Bash incluido en los appliance f\u00edsicos y virtuales McAfee Email Gateway para solventar las vulnerabilidades <\/span><\/span><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6271\" target=\"_blank\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">CVE-201<\/span><\/span><\/a><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6271\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">4<\/span><\/span><\/a><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6271\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">&#8211;<\/span><\/span><\/a><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6271\">6271<\/a> (ShellShock), <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-7169\" target=\"_blank\">CVE-2014-7169<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-7186\" target=\"_blank\">CVE-2014-7186<\/a> y <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-7187\" target=\"_blank\">CVE-2014-7187<\/a><\/span><\/span>.<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\">Para obtener m\u00e1s informaci\u00f3n puede consultar el art\u00edculo <a href=\"http:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=SB10085\" target=\"_blank\">SB10085<\/a> de McAfee.<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #800000;\"><span style=\"text-decoration: underline;\"><b><br \/>\nObtenci\u00f3n de los paquetes de instalaci\u00f3n<\/b><\/span><\/span><span style=\"color: #800000;\"><b>:<\/b><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\">Para descargar el Hotfix correspondiente a su versi\u00f3n de McAfee Email Gateway, puede hacerlo dirigi\u00e9ndose a la <a href=\"http:\/\/www.mcafee.com\/us\/downloads\/downloads.aspx\" target=\"_blank\">P\u00e1gina de descargas de McAfee<\/a> utilizando su n\u00famero de concesi\u00f3n de McAfee (Grant Number).<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><br \/>\nPara ver una lista completa de cambios aportados por este Hotfix puede consultar los documentos siguientes:<\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\">MEG 7.6.2 &#8211; <a href=\"http:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25446\" target=\"_blank\">PD25446<\/a><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\">MEG 7.5.4 &#8211; <a href=\"http:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25445\" target=\"_blank\">PD25445<\/a><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><span style=\"color: #000000;\"><span style=\"text-decoration: underline;\"><b><br \/>\nNota<\/b><\/span><\/span><span style=\"color: #000000;\"><b>:<\/b><\/span> <span style=\"color: #000000;\">McAfee <\/span><span style=\"color: #000000;\">ha calificado esta actualizaci\u00f3n <\/span><span style=\"color: #000000;\">de<\/span> <span style=\"color: #ff0000;\"><span style=\"text-decoration: underline;\"><b>Alta Prioridad<\/b><\/span><\/span><span style=\"color: #ff0000;\">.<\/span><span style=\"color: #000000;\"> Aplique esta actualizaci\u00f3n <\/span><span style=\"color: #000000;\">lo antes<\/span> <span style=\"color: #000000;\">posible.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\">\n<b><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">SATINFO<\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"es-ES\">03<\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"> de <\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">Octubre<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"es-ES\">de 201<\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">4<\/span><\/span><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee ha publicado los siguientes Hotfix para solventar la vulnerabilidad ShellShock en los appliance f\u00edsicos y virtuales McAfee Email Gateway (MEG): Hotfix 7.6.2h1010246 para McAfee Email Gateway 7.6 Hotfix 7.5.4h1010253 para McAfee Email Gateway 7.5 Vulnerabilidades resueltas: Estos Hotfix actualizan el paquete Bash incluido en los appliance f\u00edsicos y virtuales McAfee Email Gateway para solventar <a href='https:\/\/www.satinfo.es\/noticies\/2014\/publicacion-de-hotfix-para-solventar-vulnerabilidad-shellshock-en-mcafee-email-gateway-7-5-y-mcafee-email-gateway-7-6\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[517,890,892],"tags":[242,578,599,598,271],"class_list":["post-1047","post","type-post","status-publish","format-standard","hentry","category-517","category-mcafee","category-todos","tag-hotfix","tag-mcafee-email-gateway","tag-meg","tag-shellshock","tag-vulnerabilidad","category-517-id","category-890-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1047"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1047\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}