{"id":1565,"date":"2019-10-17T16:01:28","date_gmt":"2019-10-17T16:01:28","guid":{"rendered":"http:\/\/blogs.uo.edu.cu\/seginf\/?p=1565"},"modified":"2019-10-17T16:01:28","modified_gmt":"2019-10-17T16:01:28","slug":"actualizaciones-para-multiples-productos-de-adobe","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=1565","title":{"rendered":"Actualizaciones para m\u00faltiples productos de Adobe."},"content":{"rendered":"<p style=\"text-align: justify\">\n\t<a href=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/10\/Logo_Adobe_200x200.jpg\" rel=\"\" target=\"\" title=\"\"><img decoding=\"async\" alt=\"\" class=\"alignleft size-full wp-image-1566\" height=\"\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/10\/Logo_Adobe_200x200.jpg\" style=\"margin-left: 5px;margin-right: 5px\" title=\"\" width=\"\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/10\/Logo_Adobe_200x200.jpg 200w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/10\/Logo_Adobe_200x200-150x150.jpg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/a>Adobe ha publicado cuatro boletines de seguridad en los que se han corregido un total de&nbsp;<strong>82 vulnerabilidades<\/strong>&nbsp;en sus productos Adobe Experience Manager, Adobe Acrobat y Adobe Acrobat Reader, Adobe Experience Manager Forms y Adobe Download Manager.\n<\/p>\n<p><!--more--><\/p>\n<p style=\"text-align: justify\">\n\tA continuaci&oacute;n se exponen los boletines publicados para cada producto.\n<\/p>\n<p style=\"text-align: justify\">\n\tAdobe Experience Manager (APSB19-48): bolet&iacute;n que soluciona&nbsp;<strong>varias vulnerabilidades en el componente AEM cuya explotaci&oacute;n permitir&iacute;a a un atacante acceder a un entorno AEM restringido<\/strong>&nbsp;(CVE-2019-8078, CVE-2019-8079, CVE-2019-8080, CVE-2019-8083, CVE-2019-8084, CVE-2019-8085, CVE-2019-8081, CVE-2019-8086, CVE-2019-8087, CVE-2019-8088, CVE-2019-8077, CVE-2019-8234).\n<\/p>\n<p style=\"text-align: justify\">\n\tAdobe Acrobat y Adobe Acrobat Reader (APSB19-49): solventa 64 errores de seguridad en el popular lector y editor de archivos PDF, de las cuales&nbsp;<strong>45 est&aacute;n consideradas cr&iacute;ticas<\/strong>&nbsp;y permitir&iacute;an la&nbsp;<strong>ejecuci&oacute;n de c&oacute;digo arbitrario<\/strong>.\n<\/p>\n<p style=\"text-align: justify\">\n\tAdobe Experience Manager Forms (APSB19-50): se soluciona una vulnerabilidad de Cross-Site Scripting (XSS) almacenado, que podr&iacute;a ser aprovechada para&nbsp;<strong>revelar informaci&oacute;n sensible<\/strong>&nbsp;(CVE-2019-8089).\n<\/p>\n<p style=\"text-align: justify\">\n\tAdobe Download Manager (APSB19-51): este &uacute;ltimo bolet&iacute;n corrige una importante vulnerabilidad que&nbsp;<strong>permitir&iacute;a al atacante escalar privilegios<\/strong>&nbsp;en la m&aacute;quina afectada (CVE-2019-8071).\n<\/p>\n<p style=\"text-align: justify\">\n\tSe encuentran afectadas las siguientes versiones de los producto Adobe (y anteriores):\n<\/p>\n<ul>\n<li style=\"text-align: justify\">\n\t\tAdobe Experience Manager en sus versiones 6.5, 6.4, 6.3, 6.2, 6.1 y 6.0.\n\t<\/li>\n<li style=\"text-align: justify\">\n\t\tAcrobat en sus versiones 2019.012.20040, 2017.011.30148 y 2015.006.30503, y anteriores para Windows y macOS.\n\t<\/li>\n<li style=\"text-align: justify\">\n\t\tAcrobat Reader en sus versiones 2019.012.20040, 2017.011.30148, 2015.006.30503 y anteriores para Windows y macOS.\n\t<\/li>\n<li style=\"text-align: justify\">\n\t\tAdobe Experience Manager Forms en sus versiones 6.5, 6.4 y 6.3.\n\t<\/li>\n<li style=\"text-align: justify\">\n\t\tAdobe Download Manager versi&oacute;n 2.0.0.363.\n\t<\/li>\n<\/ul>\n<p style=\"text-align: justify\">\n\t<strong>M&aacute;s informaci&oacute;n: <a href=\"https:\/\/unaaldia.hispasec.com\/2019\/10\/actualizaciones-para-multiples-productos-de-adobe-3.html\">Una al D&iacute;a<\/a><\/strong><\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>Adobe ha publicado cuatro boletines de seguridad en los que se han corregido un total de&nbsp;82 vulnerabilidades&nbsp;en sus productos Adobe Experience Manager, Adobe Acrobat y Adobe Acrobat Reader, Adobe Experience Manager Forms y Adobe Download Manager. Im\u00e1genes Relacionadas:<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15,19,28,40],"tags":[],"class_list":["post-1565","post","type-post","status-publish","format-standard","hentry","category-informaciones","category-percepcion-de-riesgo","category-seguridad-informatica","category-vulnerabilidades"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1565"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1565\/revisions"}],"predecessor-version":[{"id":1567,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1565\/revisions\/1567"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}