
{"id":699,"date":"2010-04-15T09:44:30","date_gmt":"2010-04-15T12:44:30","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=699"},"modified":"2010-04-15T09:44:30","modified_gmt":"2010-04-15T12:44:30","slug":"explotan-vulnerabilidad-en-java-para-propagar-malware","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/","title":{"rendered":"Explotan vulnerabilidad en Java para propagar malware"},"content":{"rendered":"<p>Apenas unos d\u00edas despu\u00e9s de que <a href=\"http:\/\/blog.segu-info.com.ar\/2010\/04\/vulnerabilidad-0-day-en-java.html\">se  revelara una nueva vulnerabilidad peligrosa en Java<\/a>, los creadores  de virus est\u00e1n empezando a explotarla infectando computadoras con  Windows a trav\u00e9s de descargas no autorizadas.<\/p>\n<p>Se ha encontrado que un popular sitio web de letras de canciones sirve  c\u00f3digo de ataque que intenta aprovechar esa vulnerabilidad cr\u00edtica en la  m\u00e1quina virtual Java. El sitio en cuesti\u00f3n (<a href=\"http:\/\/wepawet.iseclab.org\/view.php?hash=fd0df9da22426cf82cd69e1f9dcafc15&amp;t=1271260448&amp;type=js\">ver  an\u00e1lisis<\/a>) est\u00e1 sirviendo Javascript que invoca a la debilidad  revelada la semana pasada por el investigador de seguridad Tavis  Ormandy.<\/p>\n<p>Los usuarios pueden ser atacados con s\u00f3lo visitar el sitio infectado.  Dado que Oracle no muestra indicios de querer resolver esta falla lo m\u00e1s  pronto posible, algunos investigadores creen que el exploit se har\u00e1 m\u00e1s  generalizado en los pr\u00f3ximos d\u00edas.<\/p>\n<p>El problema afecta a todas las versiones desde Java SE 6 Update 10 para  Microsoft Windows. Lamentablemente deshabilitar el plugin de Java no es  suficiente para evitar la explotaci\u00f3n. La soluci\u00f3n m\u00e1s sencilla hasta el  momento es desinstalar Java.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.blogantivirus.com\/sitio-web-explota-vulnerabilidad-en-java\">Blog  Antivirus<\/a> y Segu-Info<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apenas unos d\u00edas despu\u00e9s de que se revelara una nueva vulnerabilidad peligrosa en Java, los creadores de virus est\u00e1n empezando a explotarla infectando computadoras con Windows a trav\u00e9s de descargas no autorizadas. Se ha encontrado que un popular sitio web de letras de canciones sirve c\u00f3digo de ataque que intenta aprovechar esa vulnerabilidad cr\u00edtica en [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-699","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Explotan vulnerabilidad en Java para propagar malware<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Explotan vulnerabilidad en Java para propagar malware\",\"datePublished\":\"2010-04-15T12:44:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/\"},\"wordCount\":190,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Explotan vulnerabilidad en Java para propagar malware\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2010-04-15T12:44:30+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Explotan vulnerabilidad en Java para propagar malware","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Explotan vulnerabilidad en Java para propagar malware","datePublished":"2010-04-15T12:44:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/"},"wordCount":190,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/","url":"https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Explotan vulnerabilidad en Java para propagar malware","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2010-04-15T12:44:30+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/explotan-vulnerabilidad-en-java-para-propagar-malware\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=699"}],"version-history":[{"count":2,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/699\/revisions"}],"predecessor-version":[{"id":701,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/699\/revisions\/701"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}