{"id":984,"date":"2014-09-24T22:25:00","date_gmt":"2014-09-24T21:25:00","guid":{"rendered":"http:\/\/salesianosatocha.es\/informatica\/?guid=f50e917c594faa3f6371ded1e800394b"},"modified":"2014-09-29T08:41:14","modified_gmt":"2014-09-29T07:41:14","slug":"vulnerabilidad-explotable-remotamente-en-bash","status":"publish","type":"post","link":"https:\/\/salesianosatocha.es\/informatica\/2014\/09\/24\/vulnerabilidad-explotable-remotamente-en-bash\/","title":{"rendered":"Vulnerabilidad explotable remotamente en bash"},"content":{"rendered":"<p>Por raro que parezca hay una vulnerabilidad en bash que puede ser explotada remotamente en ciertos escenarios (CVE-2014-6271). M&#225;s informaci&#243;n en el blog de seguridad de Red Hat y en el anuncio de seguridad de Debian. Ambas distribuciones disponen ya de actualizaci&#243;n. M&#225;s comentarios en Slashdot o en Hacker News.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Por raro que parezca hay una vulnerabilidad en bash que puede ser explotada remotamente en ciertos escenarios (CVE-2014-6271). M&aacute;s informaci&oacute;n en el blog de seguridad de Red Hat y en el anuncio de seguridad de Debian. Ambas distribuciones disponen ya de actualizaci&oacute;n. M&aacute;s comentarios en Slashdot o en Hacker News.<\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ngg_post_thumbnail":0,"footnotes":""},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/posts\/984"}],"collection":[{"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/comments?post=984"}],"version-history":[{"count":1,"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/posts\/984\/revisions"}],"predecessor-version":[{"id":985,"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/posts\/984\/revisions\/985"}],"wp:attachment":[{"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/media?parent=984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/categories?post=984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/salesianosatocha.es\/informatica\/wp-json\/wp\/v2\/tags?post=984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}