{"id":1080,"date":"2014-11-07T13:31:18","date_gmt":"2014-11-07T12:31:18","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1080"},"modified":"2014-11-07T13:31:18","modified_gmt":"2014-11-07T12:31:18","slug":"publicacion-del-hotfix-1014944-para-epo-4-x-y-5-x","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2014\/publicacion-del-hotfix-1014944-para-epo-4-x-y-5-x\/","title":{"rendered":"Publicaci\u00f3n del Hotfix 1014944 para ePO 4.x y 5.x"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">McAfee ha publicado el Hotfix 1014944 para ePolicy Orchestrator 4.x y 5.x que solventa tres vulnerabilidades de SSLv3.<\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\"><br \/>\nEste hotfix ha sido desarrollado para su uso con las siguientes versiones de McAfee \u00ae ePolicy Orchestrator \u00ae (McAfee ePO\u2122):<\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 4.6.x<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 5.0.x<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 5.1.0<\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">ePolicy Orchestrator 5.1.1 (build 357)<\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\"><br \/>\n<span style=\"color: #800000;\"><span style=\"text-decoration: underline;\"><b>Clasificaci\u00f3n del parche<\/b><\/span><\/span><span style=\"color: #800000;\"><b>: <\/b><\/span><span style=\"color: #ff0000;\"><span style=\"text-decoration: underline;\"><b>Mandatory<\/b><\/span><\/span><b> <\/b>(obligatoria)<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Esta actualizaci\u00f3n debe ser aplicada de forma inmediata para evitar una potencial brecha de seguridad. <\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Para obtener m\u00e1s informaci\u00f3n acerca de clasificaci\u00f3n de parches, consulte el art\u00edculo de la base de conocimientos de McAfee <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB51560\" target=\"_blank\">KB51560<\/a>.<\/span><\/p>\n<p class=\"western\" align=\"left\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\"><b><span style=\"color: #800000;\"><span style=\"text-decoration: underline;\">Problemas resueltos<\/span><\/span><span style=\"color: #800000;\">:<\/span><span style=\"color: #800000;\"><span style=\"text-decoration: underline;\"><br \/>\n<\/span><\/span><\/b><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Ambas vulnerabilidades descritas a continuaci\u00f3n involucran ataques de denegaci\u00f3n de servicio mediante fuga de datos en memoria. Para m\u00e1s informaci\u00f3n consulte los enlaces a continuaci\u00f3n:<\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-3513\" target=\"_blank\"><span style=\"color: #0047ff;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>CVE-2014-3513<\/b><\/span><\/span><\/span><\/a><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-3567\" target=\"_blank\"><span style=\"color: #0047ff;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>CVE-2014-3567<\/b><\/span><\/span><\/span><\/a><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">McAfee Security Bulletin <\/span><\/span><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=SB10091\" target=\"_blank\">SB10091<\/a><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\">\n<p class=\"western\" align=\"left\"><span style=\"color: #800000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>Versiones de OpenSSL afectadas<\/b><\/span><\/span><span style=\"font-size: small;\">:<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">OpenSSL 0.9.8a-zb<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">OpenSSL 1.0.0a-n<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">OpenSSL 1.0.1a-i2<br \/>\n<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #800000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>Versiones de OpenSSL que no est\u00e1n afectadas<\/b><\/span><\/span><span style=\"font-size: small;\">:<\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">OpenSSL 0.9.8zc<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">OpenSSL 1.0.0m<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">OpenSSL 1.0.1j<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b>Nota<\/b><\/span><\/span><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b>s<\/b><\/span><\/span><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b> para el administrador<\/b><\/span><\/span><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>: <\/b><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">S<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">i se instala este hotfix y, posteriormente, se vuelve a instalar el servidor ePO entonces ser\u00e1 necesario volver a instalar el hotfix. Este hotfix se incluir\u00e1 en pr\u00f3ximo<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">s<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"> parche<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">s<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"> para Epo.<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">Instale el hotfix sobre el servidor ePO sobre los Agent Handler (si los hubiera) <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">en los que la versi\u00f3n de OpenSSL no sea la 1.0.1.10 o superior<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">.<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">E<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">ste Hotfix substituye todos los archivos de Apache y de Open SSL utilizados por ePO debido a la dependencia que existe entre estas dos tecnolog\u00edas.<\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><br \/>\n<\/span><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b>V<\/b><\/span><\/span><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\"><b>erificaci\u00f3n de la instalaci\u00f3n del Hotfix<\/b><\/span><\/span><\/span><\/span><span style=\"color: #800000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>:<\/b><\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Abra la carpeta de instalaci\u00f3n de McAfee ePO o del Agent Handler<\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">McAfee ePO: &lt;ePO Install folder&gt;\\Apache2\\bin<\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Agent Handler: &lt;AH Install folder&gt;\\apache\\bin<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">Haga clic con el bot\u00f3n derecho sobre le archivo <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>ssleay32.dll <\/b><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">y seleccione Propiedades; en la pesta\u00f1a detalles ver\u00e1 los siguientes valores:<\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\">Versi\u00f3n del fichero<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">: <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>1.0.1.10<\/b><\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><span style=\"text-decoration: underline;\">Versi\u00f3n del Producto<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">: <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>1.0.1j<\/b><\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.satinfo.es\/db\/antivirus\/epo\/epohf1014944.zip\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>Pulse aqu\u00ed para descargar el Hotfix 1<\/b><\/span><\/span><\/span><\/a><a href=\"https:\/\/www.satinfo.es\/db\/antivirus\/epo\/epohf1014944.zip\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span style=\"text-decoration: underline;\"><b>014944<\/b><\/span><\/span><\/span><\/a><\/span><\/p>\n<p class=\"western\" align=\"left\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><b><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\">SATINFO<\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">, <\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"es-ES\">7<\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"> de <\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">Noviembre<\/span><\/span> <span style=\"font-size: small;\"><span lang=\"es-ES\">de 201<\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\">4<\/span><\/span><\/b><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee ha publicado el Hotfix 1014944 para ePolicy Orchestrator 4.x y 5.x que solventa tres vulnerabilidades de SSLv3. Este hotfix ha sido desarrollado para su uso con las siguientes versiones de McAfee \u00ae ePolicy Orchestrator \u00ae (McAfee ePO\u2122): ePolicy Orchestrator 4.6.x ePolicy Orchestrator 5.0.x ePolicy Orchestrator 5.1.0 ePolicy Orchestrator 5.1.1 (build 357) Clasificaci\u00f3n del parche: <a href='https:\/\/www.satinfo.es\/noticies\/2014\/publicacion-del-hotfix-1014944-para-epo-4-x-y-5-x\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[517,890,892],"tags":[617,616,615,20],"class_list":["post-1080","post","type-post","status-publish","format-standard","hentry","category-517","category-mcafee","category-todos","tag-5-x","tag-epo-4-x","tag-hotfix-1014944","tag-mcafee","category-517-id","category-890-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1080"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1080\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}