{"id":11241,"date":"2026-01-28T18:23:13","date_gmt":"2026-01-29T00:23:13","guid":{"rendered":"https:\/\/beaconlab.us\/?post_type=publicacion&#038;p=11241"},"modified":"2026-01-28T18:23:26","modified_gmt":"2026-01-29T00:23:26","slug":"alerta-2026-11-vulnerabilidad-openssl","status":"publish","type":"publicacion","link":"https:\/\/beaconlab.us\/es\/publicacion\/alerta-2026-11-vulnerabilidad-openssl\/","title":{"rendered":"Alerta 2026-11 Vulnerabilidad OpenSSL"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Producto(s) afectado(s):<\/h2>\n\n\n\n<p class=\"has-text-align-left\">\u2022 OpenSSL versions\u00a03.6, 3.5, 3.4, 3.3, 3.0\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Descripci\u00f3n<\/h2>\n\n\n\n<p>Una vulnerabilidad&nbsp;de alta&nbsp;criticidad&nbsp;catalogada&nbsp;como CVE-2025-15467,&nbsp;mediante&nbsp;un desbordamiento&nbsp;del&nbsp;b\u00fafer&nbsp;en la pila&nbsp;podr\u00eda provocar un&nbsp;DoS&nbsp;o ejecuci\u00f3n remota de c\u00f3digo en determinadas condiciones.&nbsp;<\/p>\n\n\n\n<p>El error reside en la forma en que OpenSSL procesa mensajes espec\u00edficos de la Sintaxis de Mensajes Criptogr\u00e1ficos (CMS), particularmente aquellos que utilizan la estructura&nbsp;AuthEnvelopedData&nbsp;con algoritmos de cifrado AEAD (como AES-GCM).&nbsp;<\/p>\n\n\n\n<p>Al analizar estos mensajes, OpenSSL extrae un dato llamado&nbsp;<strong>Vector de Inicializaci\u00f3n (IV)<\/strong>&nbsp;y lo copia en un espacio de memoria de tama\u00f1o fijo sin verificar si el dato es demasiado grande para dicho espacio. Un atacante puede enviar un mensaje dise\u00f1ado maliciosamente con un IV sobredimensionado, provocando una escritura fuera de los l\u00edmites de la memoria.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Soluci\u00f3n<\/h2>\n\n\n\n<p>Los usuarios afectados deben actualizar&nbsp;a las siguientes versiones:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.6 \u2192 3.6.1\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.5 \u2192 3.5.5\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.4 \u2192 3.4.4\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.3 \u2192 3.3.6\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.0 \u2192 3.0.19\u00a0<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Informaci\u00f3n adicional:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/research.jfrog.com\/post\/potential-rce-vulnerabilityin-openssl-cve-2025-15467\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/research.jfrog.com\/post\/potential-rce-vulnerabilityin-openssl-cve-2025-15467\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2025-15467\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/access.redhat.com\/security\/cve\/cve-2025-15467<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-15467\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-15467<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/cyberpress.org\/openssl-vulnerabilities-remote-execute-malicious-code\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cyberpress.org\/openssl-vulnerabilities-remote-execute-malicious-code\/<\/a>\u00a0<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-11241","publicacion","type-publicacion","status-publish","hentry"],"acf":{"activar_pdf_link":false,"pdf":null,"numero_de_boletin":"","traffic_light_protocol":"Amber"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/11241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion"}],"about":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/types\/publicacion"}],"version-history":[{"count":1,"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/11241\/revisions"}],"predecessor-version":[{"id":11242,"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/11241\/revisions\/11242"}],"wp:attachment":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/media?parent=11241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}