{"id":7618,"date":"2024-10-10T18:08:24","date_gmt":"2024-10-11T00:08:24","guid":{"rendered":"https:\/\/beaconlab.mx\/?post_type=publicacion&#038;p=6290"},"modified":"2024-10-21T16:06:25","modified_gmt":"2024-10-21T21:06:25","slug":"2024-51-zero-day-activamente-explotada-en-firefox","status":"publish","type":"publicacion","link":"https:\/\/beaconlab.us\/es\/publicacion\/2024-51-zero-day-activamente-explotada-en-firefox\/","title":{"rendered":"Alerta 2024-51 Zero-Day activamente explotada en Firefox"},"content":{"rendered":"<p><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">Mozilla<\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\"> ha lanzado una actualizaci\u00f3n urgente para <\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">Firefox<\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\"> (versi\u00f3n 131.0.2) y <\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">Firefox ESR<\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\"> (versiones <\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">115.16.1 y 128.3.1<\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">) para corregir una vulnerabilidad cr\u00edtica de ejecuci\u00f3n de c\u00f3digo remoto, <\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">CVE-2024-9680<\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">. <\/span><span class=\"NormalTextRun SCXW42172170 BCX0\">El popular navegador <\/span><span class=\"NormalTextRun SCXW42172170 BCX0\">web de c\u00f3digo abierto junto con su versi\u00f3n <\/span><span class=\"NormalTextRun SCXW42172170 BCX0\">para empresas y organizaciones presentan <\/span><span class=\"NormalTextRun SCXW42172170 BCX0\">un problema de <\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\">use-after-free<\/span><\/span><span class=\"TextRun SCXW42172170 BCX0\" lang=\"ES-MX\" xml:lang=\"ES-MX\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42172170 BCX0\"> en las animaciones de la l\u00ednea de tiempo, <\/span><span class=\"NormalTextRun SCXW42172170 BCX0\">y <\/span><span class=\"NormalTextRun SCXW42172170 BCX0\">ha sido activamente explotado en ataques. Un atacante puede aprovechar este error para ejecutar c\u00f3digo malicioso en el proceso de contenido del navegador.<\/span><\/span><span class=\"EOP SCXW42172170 BCX0\" data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Mozilla ha lanzado actualizaciones para mitigar esta vulnerabilidad en las versiones afectadas por lo que se recomienda a todos los usuarios actualizar sus navegadores lo antes posible para evitar posibles explotaciones de esta vulnerabilidad.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Puedes encontrar m\u00e1s informaci\u00f3n y detalles en el <\/span><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2024-37\/\"><span data-contrast=\"none\">sitio oficial de Mozilla<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n","protected":false},"featured_media":7640,"template":"","class_list":["post-7618","publicacion","type-publicacion","status-publish","has-post-thumbnail","hentry"],"acf":{"activar_pdf_link":true,"pdf":7958,"numero_de_boletin":"","traffic_light_protocol":"Amber"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/7618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion"}],"about":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/types\/publicacion"}],"version-history":[{"count":1,"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/7618\/revisions"}],"predecessor-version":[{"id":7807,"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/7618\/revisions\/7807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/media\/7640"}],"wp:attachment":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/media?parent=7618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}