<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <div class="moz-cite-prefix">Estimados,<br>
      <br>
      Eso es solo a efectos de verificar que un sistema es vulnerable.<br>
      Es importante aclarar que ahora estamos detectando una "barrida"
      buscando sitios vulnerables y, en algunos casos, ya detectamos la
      expansión de una bot aprovechando la vulnerabilidad.<br>
      <br>
      Saludos<br>
      ---<br>
      El 26/09/14 09:31, Oswaldo Aguirre escribió:<br>
    </div>
    <blockquote
cite="mid:CANwKcyCFLQ1gdCrS1vOYn9ZWeOPwRHrBNebd1KNmz27s961Spg@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div>ciertamente, pero me imagino que, al no haber ninguna</div>
        <div>variable o patron que pueda ser instanciado, no hace mucha</div>
        <div>diferencia, yo usaria simples, en eso concuerdo.</div>
        <div><br>
        </div>
        <div>en <a moz-do-not-send="true"
href="http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/">una
            de las referencias</a> usan las simples</div>
        <div><br>
        </div>
        <div>
          <pre style="overflow:auto;color:rgb(38,48,52);font-size:14px;line-height:20px">env x='() { :;}; echo vulnerable' bash -c "echo this is a test"</pre>
        </div>
        <div><br>
        </div>
        <div>saludos</div>
        <div><br>
        </div>
        <div class="gmail_extra"><br>
          <div class="gmail_quote">On Fri, Sep 26, 2014 at 5:33 AM, Jose
            Luis Gaspoz <span dir="ltr"><<a moz-do-not-send="true"
                href="mailto:gaspozj@is.com.ar" target="_blank">gaspozj@is.com.ar</a>></span>
            wrote:<br>
            <blockquote class="gmail_quote" style="margin:0px 0px 0px
0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
              <div dir="ltr" bgcolor="#ffffff" text="#000000">
                <div dir="ltr">
                  <div
                    style="font-size:12pt;font-family:Calibri;color:rgb(0,0,0)">
                    <div>Hernán:</div>
                    <div> </div>
                    <div>¿no están mal el tipo de comillas en la primera
                      parte del codigo del seteo de la variable? ....
                      deberian ser comillas simples y no dobles.</div>
                    <div> </div>
                    <div>Saludos</div>
                    <div> </div>
                    <div
                      style="font-size:12pt;font-family:Calibri;color:rgb(0,0,0)">Ing.
                      Jose Luis Gaspoz<br>
                      Internet Services S.A.<br>
                      Tel: 0342-4565118<br>
                      Cel: 342-5008523</div>
                    <div
style="font-size:small;text-decoration:none;font-family:Calibri;font-weight:normal;color:rgb(0,0,0);font-style:normal;display:inline">
                      <div
style="font-style:normal;font-variant:normal;font-weight:normal;font-size:10pt;line-height:normal;font-family:tahoma">
                        <div> </div>
                        <div style="background:rgb(245,245,245)">
                          <div><b>From:</b> <a moz-do-not-send="true"
                              title="hmereles@senatics.gov.py"
                              href="mailto:hmereles@senatics.gov.py"
                              target="_blank">Herman Mereles</a> </div>
                          <div><b>Sent:</b> Thursday, September 25, 2014
                            5:32 PM</div>
                          <div><b>To:</b> <a moz-do-not-send="true"
                              title="seguridad@lacnic.net"
                              href="mailto:seguridad@lacnic.net"
                              target="_blank">Lista para discusion de
                              seguridad en redes y sistemas informaticos
                              de la region</a> </div>
                          <div><b>Subject:</b> Re: [LACNIC/Seguridad]
                            Fwd: TA14-268A: GNU Bourne Again Shell
                            (Bash) ‘Shellshock’ Vulnerability
                            (CVE-2014-6271,CVE-2014-7169)</div>
                        </div>
                      </div>
                      <div> </div>
                    </div>
                    <div
style="font-size:small;text-decoration:none;font-family:Calibri;font-weight:normal;color:rgb(0,0,0);font-style:normal;display:inline"><span
                        class="">Raúl, compañeros,<br>
                        <br>
                        Este es un boletín que nosotros hemos redactado,<br>
                        <br>
                        Saludos<br>
                        ---<br>
                        <div>El 25/09/14 a las 16:19, Raul Cabrera
                          escibió:<br>
                        </div>
                      </span>
                      <blockquote type="cite">
                        <div><span class="">
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US">Del Blog Schneier on
                                Security:</span></p>
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US"></span> </p>
                            <p class="MsoNormal"><b><span
                                  style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                  lang="EN-US">“Nasty Vulnerability
                                  found in Bash” (</span></b><span
style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"
                                lang="EN-US"> </span><span
style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><a
                                  moz-do-not-send="true"
href="https://www.schneier.com/blog/archives/2014/09/nasty_vulnerabi.html"
                                  target="_blank"><span lang="EN-US">https://www.schneier.com/blog/archives/2014/09/nasty_vulnerabi.html</span></a></span><span
style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)">
                              </span><b><span
                                  style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                  lang="EN-US">)</span></b><span
style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"
                                lang="EN-US"></span></p>
                            <p class="MsoNormal"><span
style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"
                                lang="EN-US"></span> </p>
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US">Saludos cordiales.</span></p>
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US"></span> </p>
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US"></span> </p>
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US">RAUL EDUARDO CABRERA</span></p>
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US"></span> </p>
                            <p class="MsoNormal"><span
                                style="font-size:11pt;font-family:Calibri,sans-serif;color:black"
                                lang="EN-US"></span> </p>
                            <div>
                              <div
                                style="border-top-color:rgb(181,196,223);border-width:1pt
                                medium medium;border-style:solid none
                                none;padding:3pt 0cm 0cm">
                                <p class="MsoNormal"><b><span
                                      style="font-size:10pt;font-family:Tahoma,sans-serif;color:windowtext"
                                      lang="ES">De:</span></b><span
                                    style="font-size:10pt;font-family:Tahoma,sans-serif;color:windowtext"
                                    lang="ES"> Seguridad [<a
                                      moz-do-not-send="true"
                                      href="mailto:seguridad-bounces@lacnic.net"
                                      target="_blank">mailto:seguridad-bounces@lacnic.net</a>]
                                    <b>En nombre de </b>Fernando Gont<br>
                                    <b>Enviado el:</b> jueves, 25 de
                                    septiembre de 2014 04:51 p.m.<br>
                                    <b>Para:</b> Lista para discusión de
                                    seguridad en redes y sistemas
                                    informaticos de la región<br>
                                    <b>Asunto:</b> [LACNIC/Seguridad]
                                    Fwd: TA14-268A: GNU Bourne Again
                                    Shell (Bash) ‘Shellshock’
                                    Vulnerability
                                    (CVE-2014-6271,CVE-2014-7169)</span></p>
                              </div>
                            </div>
                            <p class="MsoNormal"> </p>
                            <p class="MsoNormal">FYI</p>
                          </span>
                          <div>
                            <p class="MsoNormal"><br>
                              <br>
                              -------- Forwarded Message -------- </p>
                            <table style="color:rgb(0,0,0)" border="0"
                              cellpadding="0" cellspacing="0">
                              <tbody>
                                <tr>
                                  <td style="padding:0cm"
                                    nowrap="nowrap" valign="top">
                                    <p class="MsoNormal"
                                      style="text-align:right"
                                      align="right"><b>Subject: </b></p>
                                  </td>
                                  <td style="padding:0cm">
                                    <p class="MsoNormal">TA14-268A: GNU
                                      Bourne Again Shell (Bash)
                                      ‘Shellshock’ Vulnerability
                                      (CVE-2014-6271,CVE-2014-7169)</p>
                                  </td>
                                </tr>
                                <tr>
                                  <td style="padding:0cm"
                                    nowrap="nowrap" valign="top">
                                    <p class="MsoNormal"
                                      style="text-align:right"
                                      align="right"><b>Date: </b></p>
                                  </td>
                                  <td style="padding:0cm">
                                    <p class="MsoNormal">Thu, 25 Sep
                                      2014 14:10:57 -0500</p>
                                  </td>
                                </tr>
                                <tr>
                                  <td style="padding:0cm"
                                    nowrap="nowrap" valign="top">
                                    <p class="MsoNormal"
                                      style="text-align:right"
                                      align="right"><b>From: </b></p>
                                  </td>
                                  <td style="padding:0cm">
                                    <p class="MsoNormal">US-CERT <a
                                        moz-do-not-send="true"
                                        href="mailto:US-CERT@ncas.us-cert.gov"
                                        target="_blank">mailto:US-CERT@ncas.us-cert.gov</a></p>
                                  </td>
                                </tr>
                                <tr>
                                  <td style="padding:0cm"
                                    nowrap="nowrap" valign="top">
                                    <p class="MsoNormal"
                                      style="text-align:right"
                                      align="right"><b>Reply-To: </b></p>
                                  </td>
                                  <td style="padding:0cm">
                                    <p class="MsoNormal"><a
                                        moz-do-not-send="true"
                                        href="mailto:US-CERT@ncas.us-cert.gov"
                                        target="_blank">US-CERT@ncas.us-cert.gov</a></p>
                                  </td>
                                </tr>
                                <tr>
                                  <td style="padding:0cm"
                                    nowrap="nowrap" valign="top">
                                    <p class="MsoNormal"
                                      style="text-align:right"
                                      align="right"><b>To: </b></p>
                                  </td>
                                  <td style="padding:0cm">
                                    <p class="MsoNormal"><a
                                        moz-do-not-send="true"
                                        href="mailto:fernando@gont.com.ar"
                                        target="_blank">fernando@gont.com.ar</a></p>
                                  </td>
                                </tr>
                              </tbody>
                            </table>
                            <div>
                              <div class="h5">
                                <p class="MsoNormal"
                                  style="margin-bottom:12pt"> </p>
                                <div align="center">
                                  <table
                                    style="width:525pt;color:rgb(0,0,0)"
                                    width="700" border="0"
                                    cellpadding="0" cellspacing="0">
                                    <tbody>
                                      <tr>
                                        <td style="padding:0cm">
                                          <p><img moz-do-not-send="true"
                                              alt="NCCIC / US-CERT"
                                              height="100" width="700"
                                              border="0"></p>
                                          <p>National Cyber Awareness
                                            System:</p>
                                          <div
                                            style="margin-bottom:24pt">
                                            <div
                                              style="margin-bottom:3.6pt">
                                              <p class="MsoNormal"><b><span
style="font-size:14.5pt"><a moz-do-not-send="true"
                                                      href="https://www.us-cert.gov/ncas/alerts/TA14-268A"
                                                      target="_blank">TA14-268A:
                                                      GNU Bourne Again
                                                      Shell (Bash)
                                                      ‘Shellshock’
                                                      Vulnerability
                                                      (CVE-2014-6271,CVE-2014-7169)</a></span></b></p>
                                            </div>
                                            <div
                                              style="margin-bottom:3.6pt">
                                              <p class="MsoNormal"><i><span
style="font-size:11pt;color:rgb(102,102,102)">09/25/2014 12:56 PM EDT</span></i></p>
                                            </div>
                                            <p class="MsoNormal"> </p>
                                            <div
                                              style="margin-bottom:3.6pt">
                                              <p class="MsoNormal">Original
                                                release date: September
                                                25, 2014</p>
                                              <h3>Systems Affected</h3>
                                              <ul type="disc">
                                                <li class="MsoNormal">GNU
                                                  Bash through 4.3. </li>
                                                <li class="MsoNormal">Linux,
                                                  BSD, and UNIX
                                                  distributions
                                                  including but not
                                                  limited to: </li>
                                              </ul>
                                              <ul type="disc">
                                                <ul type="circle">
                                                  <li class="MsoNormal"><a
moz-do-not-send="true"
href="http://lists.centos.org/pipermail/centos/2014-September/146099.html"
                                                      target="_blank">CentOS</a>
                                                    5 through 7 </li>
                                                  <li class="MsoNormal"><a
moz-do-not-send="true"
href="https://lists.debian.org/debian-security-announce/2014/msg00220.html"
                                                      target="_blank">Debian</a>
                                                  </li>
                                                  <li class="MsoNormal">Mac
                                                    OS X </li>
                                                  <li class="MsoNormal">Red
                                                    Hat Enterprise Linux
                                                    4 through 7 </li>
                                                  <li class="MsoNormal"><a
moz-do-not-send="true" href="http://www.ubuntu.com/usn/usn-2362-1/"
                                                      target="_blank">Ubuntu</a>
                                                    10.04 LTS, 12.04
                                                    LTS, and 14.04 LTS </li>
                                                </ul>
                                              </ul>
                                              <h3>Overview</h3>
                                              <p>A critical
                                                vulnerability has been
                                                reported in the GNU
                                                Bourne Again Shell
                                                (Bash), the common
                                                command-line shell used
                                                in most Linux/UNIX
                                                operating systems and
                                                Apple’s Mac OS X. The
                                                flaw could allow an
                                                attacker to remotely
                                                execute shell commands
                                                by attaching malicious
                                                code in environment
                                                variables used by the
                                                operating system <a
                                                  moz-do-not-send="true"
href="http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/"
                                                  target="_blank">[1]</a>.
                                                The United States
                                                Department of Homeland
                                                Security (DHS) is
                                                releasing this Technical
                                                Alert to provide further
                                                information about the
                                                GNU Bash vulnerability.</p>
                                              <h3>Description</h3>
                                              <p>GNU Bash versions 1.14
                                                through 4.3 contain a
                                                flaw that processes
                                                commands placed after
                                                function definitions in
                                                the added environment
                                                variable, allowing
                                                remote attackers to
                                                execute arbitrary code
                                                via a crafted
                                                environment which
                                                enables network-based
                                                exploitation. [<a
                                                  moz-do-not-send="true"
href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271"
                                                  target="_blank">2</a>,
                                                <a
                                                  moz-do-not-send="true"
href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169"
                                                  target="_blank">3</a>]</p>
                                              <p>Critical instances
                                                where the vulnerability
                                                may be exposed include:
                                                [<a
                                                  moz-do-not-send="true"
href="https://access.redhat.com/security/cve/CVE-2014-6271"
                                                  target="_blank"><span
style="color:rgb(0,0,238)">4</span></a>, <a moz-do-not-send="true"
href="http://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
                                                  target="_blank">5</a>]</p>
                                              <ul type="disc">
                                                <li class="MsoNormal">Apache
                                                  HTTP Server using
                                                  mod_cgi or mod_cgid
                                                  scripts either written
                                                  in bash, or spawn
                                                  subshells. </li>
                                                <li class="MsoNormal">Override
                                                  or Bypass ForceCommand
                                                  feature in OpenSSH
                                                  sshd and limited
                                                  protection for some
                                                  Git and Subversion
                                                  deployments used to
                                                  restrict shells and
                                                  allows arbitrary
                                                  command execution
                                                  capabilities. </li>
                                                <li class="MsoNormal">Allow
                                                  arbitrary commands to
                                                  run on a DHCP client
                                                  machine, various
                                                  Daemons and
                                                  SUID/privileged
                                                  programs. </li>
                                                <li class="MsoNormal">Exploit
                                                  servers and other Unix
                                                  and Linux devices via
                                                  Web requests, secure
                                                  shell, telnet
                                                  sessions, or other
                                                  programs that use Bash
                                                  to execute scripts. </li>
                                              </ul>
                                              <h3>Impact</h3>
                                              <p>This vulnerability is
                                                classified by industry
                                                standards as “High”
                                                impact with CVSS Impact
                                                Subscore 10 and “Low” on
                                                complexity, which means
                                                it takes little skill to
                                                perform. This flaw
                                                allows attackers to
                                                provide specially
                                                crafted environment
                                                variables containing
                                                arbitrary commands that
                                                can be executed on
                                                vulnerable systems. It
                                                is especially dangerous
                                                because of the prevalent
                                                use of the Bash shell
                                                and its ability to be
                                                called by an application
                                                in numerous ways.</p>
                                              <h3>Solution</h3>
                                              <p>Patches have been
                                                released to fix this
                                                vulnerability by major
                                                Linux vendors for
                                                affected versions.
                                                Solutions for
                                                CVE-2014-6271 do not
                                                completely resolve the
                                                vulnerability. It is
                                                advised to install
                                                existing patches and pay
                                                attention for updated
                                                patches to address
                                                CVE-2014-7169.</p>
                                              <p>Many UNIX-like
                                                operating systems,
                                                including Linux
                                                distributions, BSD
                                                variants, and Apple Mac
                                                OS X include Bash and
                                                are likely to be
                                                affected. Contact your
                                                vendor for updated
                                                information. A list of
                                                vendors can be found in
                                                CERT Vulnerability Note
                                                <a
                                                  moz-do-not-send="true"
href="http://www.kb.cert.org/vuls/id/252743" target="_blank">VU#252743</a>
                                                <a
                                                  moz-do-not-send="true"
href="http://www.kb.cert.org/vuls/id/252743" target="_blank">[6]</a>.</p>
                                              <p>US-CERT recommends
                                                system administrators
                                                review the vendor
                                                patches and the NIST
                                                Vulnerability Summary
                                                for <a
                                                  moz-do-not-send="true"
href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169"
                                                  target="_blank">CVE-2014-7169</a>,
                                                to mitigate damage
                                                caused by the exploit.</p>
                                              <h3>References</h3>
                                              <ul type="disc">
                                                <li class="MsoNormal"><a
moz-do-not-send="true"
href="http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/"
                                                    target="_blank">Ars
                                                    Technica, Bug in
                                                    Bash shell creates
                                                    big security hole on
                                                    anything with *nix
                                                    in it; </a> </li>
                                                <li class="MsoNormal"><a
moz-do-not-send="true"
                                                    href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271"
                                                    target="_blank">DHS
                                                    NCSD; Vulnerability
                                                    Summary for
                                                    CVE-2014-6271</a> </li>
                                                <li class="MsoNormal"><a
moz-do-not-send="true"
                                                    href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169"
                                                    target="_blank">DHS
                                                    NCSD; Vulnerability
                                                    Summary for
                                                    CVE-2014-7169</a> </li>
                                                <li class="MsoNormal"><a
moz-do-not-send="true"
                                                    href="https://access.redhat.com/security/cve/CVE-2014-6271"
                                                    target="_blank">Red
                                                    Hat, CVE-2014-6271 </a>
                                                </li>
                                                <li class="MsoNormal"><a
moz-do-not-send="true"
href="https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
                                                    target="_blank">Red
                                                    Hat, Bash
                                                    specially-crafted
                                                    environment
                                                    variables code
                                                    injection attack</a>
                                                </li>
                                                <li class="MsoNormal"><a
moz-do-not-send="true" href="http://www.kb.cert.org/vuls/id/252743"
                                                    target="_blank">CERT
                                                    Vulnerability Note
                                                    VU#252743</a> </li>
                                              </ul>
                                              <h3>Revision History</h3>
                                              <ul type="disc">
                                                <li class="MsoNormal">September
                                                  25, 2014 - Initial
                                                  Release </li>
                                              </ul>
                                              <div class="MsoNormal"
                                                style="text-align:center"
                                                align="center">
                                                <hr size="2"
                                                  width="100%"
                                                  align="center"> </div>
                                              <p>This product is
                                                provided subject to this
                                                <a
                                                  moz-do-not-send="true"
href="http://www.us-cert.gov/privacy/notification" target="_blank">Notification</a>
                                                and this <a
                                                  moz-do-not-send="true"
href="http://www.us-cert.gov/privacy/" target="_blank">Privacy & Use</a>
                                                policy.</p>
                                            </div>
                                          </div>
                                          <div>
                                            <div class="MsoNormal"
                                              style="text-align:center"
                                              align="center">
                                              <hr size="2" width="100%"
                                                align="center"> </div>
                                            <table
                                              style="width:300pt;color:rgb(0,0,0)"
                                              width="400" border="0"
                                              cellpadding="0"
                                              cellspacing="0">
                                              <tbody>
                                                <tr style="height:18pt">
                                                  <td
                                                    style="height:18pt;padding:0cm"
                                                    valign="bottom">
                                                    <p class="MsoNormal"><span
style="font-size:9pt;font-family:Arial,sans-serif;color:rgb(102,102,102)">OTHER
                                                        RESOURCES:</span></p>
                                                  </td>
                                                </tr>
                                                <tr style="height:18pt">
                                                  <td
                                                    style="height:18pt;padding:0cm">
                                                    <p class="MsoNormal"><span
style="font-size:9pt;font-family:Arial,sans-serif;color:rgb(102,102,102)"><a
moz-do-not-send="true" href="http://www.us-cert.gov/contact-us/"
                                                          target="_blank">Contact
                                                          Us</a> | <a
                                                          moz-do-not-send="true"
href="http://www.us-cert.gov/security-publications" target="_blank">Security
                                                          Publications</a>
                                                        | <a
                                                          moz-do-not-send="true"
href="http://www.us-cert.gov/ncas" target="_blank">Alerts and Tips</a> |
                                                        <a
                                                          moz-do-not-send="true"
href="http://www.us-cert.gov/related-resources" target="_blank">Related
                                                          Resources</a></span></p>
                                                  </td>
                                                </tr>
                                              </tbody>
                                            </table>
                                            <p class="MsoNormal"> </p>
                                            <table
                                              style="width:112.5pt;color:rgb(0,0,0)"
                                              width="150" border="0"
                                              cellpadding="0"
                                              cellspacing="0">
                                              <tbody>
                                                <tr style="height:18pt">
                                                  <td
                                                    style="height:18pt;padding:0cm"
                                                    colspan="7"
                                                    valign="bottom">
                                                    <p class="MsoNormal"><span
style="font-size:9pt;font-family:Arial,sans-serif;color:rgb(102,102,102)">STAY
                                                        CONNECTED:</span></p>
                                                  </td>
                                                </tr>
                                                <tr>
                                                  <td
                                                    style="width:30.75pt;padding:0cm"
                                                    width="41">
                                                    <p class="MsoNormal"><a
moz-do-not-send="true"
                                                        href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new"
                                                        target="_blank"><span
style="text-decoration:none"><img moz-do-not-send="true" alt="Sign up
                                                          for email
                                                          updates"
                                                          height="25"
                                                          width="25"
                                                          border="0"></span></a></p>
                                                  </td>
                                                  <td
                                                    style="padding:0cm"><br>
                                                  </td>
                                                  <td
                                                    style="padding:0cm"><br>
                                                  </td>
                                                  <td
                                                    style="padding:0cm"><br>
                                                  </td>
                                                  <td
                                                    style="padding:0cm"><br>
                                                  </td>
                                                  <td
                                                    style="padding:0cm"><br>
                                                  </td>
                                                  <td
                                                    style="padding:0cm"><br>
                                                  </td>
                                                </tr>
                                              </tbody>
                                            </table>
                                            <p><span
style="font-size:9pt;font-family:Arial,sans-serif;color:rgb(102,102,102)">SUBSCRIBER
                                                SERVICES:<br>
                                                <a
                                                  moz-do-not-send="true"
href="http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true"
                                                  target="_blank">Manage
                                                  Preferences</a>  |  <a
                                                  moz-do-not-send="true"
href="https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.3401fc02ac14ed36b08029852a939882&destination=fernando@gont.com.ar"
                                                  target="_blank">Unsubscribe</a> 
                                                |  <a
                                                  moz-do-not-send="true"
href="https://subscriberhelp.govdelivery.com/" target="_blank">Help</a></span></p>
                                          </div>
                                          <div>
                                            <div class="MsoNormal"
                                              style="text-align:center"
                                              align="center">
                                              <hr size="2" width="100%"
                                                align="center"> </div>
                                            <table
                                              style="width:100%;color:rgb(0,0,0)"
                                              width="100%" border="0"
                                              cellpadding="0"
                                              cellspacing="0">
                                              <tbody>
                                                <tr>
                                                  <td
                                                    style="width:89%;padding:0cm"
                                                    width="89%">
                                                    <p class="MsoNormal"><span
style="font-size:7.5pt;font-family:Arial,sans-serif;color:gray">This
                                                        email was sent
                                                        to <a
                                                          moz-do-not-send="true"
href="mailto:fernando@gont.com.ar" target="_blank">fernando@gont.com.ar</a>
                                                        using
                                                        GovDelivery, on
                                                        behalf of:
                                                        United States
                                                        Computer
                                                        Emergency
                                                        Readiness Team
                                                        (US-CERT) · 245
                                                        Murray Lane SW
                                                        Bldg 410 ·
                                                        Washington, DC
                                                        20598 · <a
                                                          moz-do-not-send="true"
href="tel:%28703%29%20235-5110" value="+17032355110" target="_blank">(703)
                                                          235-5110</a></span></p>
                                                  </td>
                                                  <td
                                                    style="width:11%;padding:0cm"
                                                    width="11%">
                                                    <p class="MsoNormal"
style="text-align:right" align="right"><a moz-do-not-send="true"
                                                        href="http://www.govdelivery.com/portals/powered-by"
                                                        target="_blank"><span
style="text-decoration:none"><img moz-do-not-send="true" alt="Powered by
                                                          GovDelivery"
                                                          height="35"
                                                          width="115"
                                                          border="0"></span></a></p>
                                                  </td>
                                                </tr>
                                              </tbody>
                                            </table>
                                          </div>
                                        </td>
                                      </tr>
                                    </tbody>
                                  </table>
                                </div>
                                <p class="MsoNormal"><br>
                                  <br>
                                </p>
                                <pre>-- </pre>
                                <pre>Fernando Gont</pre>
                                <pre>e-mail: <a moz-do-not-send="true" href="mailto:fernando@gont.com.ar" target="_blank">fernando@gont.com.ar</a> || <a moz-do-not-send="true" href="mailto:fgont@si6networks.com" target="_blank">fgont@si6networks.com</a></pre>
                                <pre>PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1</pre>
                                <pre> </pre>
                                <pre> </pre>
                                <pre> </pre>
                                <p class="MsoNormal"> </p>
                              </div>
                            </div>
                          </div>
                          <p class="MsoNormal"> </p>
                        </div>
                        <div>
                          <div class="h5"><br>
                            <hr size="3" width="630" align="center">
                            <p style="text-align:left"><span
style="font-size:12px;text-decoration:none;font-family:times;text-transform:none;font-weight:normal;color:rgb(0,0,0);font-style:normal;background-color:rgb(255,255,255)">La
                                información contenida en esta
                                comunicación se dirige exclusivamente
                                para el uso de la persona o entidad a
                                quien va dirigida y otros autorizados
                                para recibirlo. Puede contener
                                información confidencial o legalmente
                                protegida. Si usted no es el
                                destinatario indicado, queda notificado
                                de que cualquier revelación, copia,
                                distribución o tomar cualquier acción
                                basada en el contenido de esta
                                información está estrictamente prohibida
                                y puede ser ilegal. Si usted ha recibido
                                esta comunicación por error, le rogamos
                                nos lo notifique inmediatamente
                                respondiendo a este correo y elimine de
                                su sistema. SADAIC no es responsable de
                                la transmisión correcta y completa de la
                                información contenida en esta
                                comunicación, ni por cualquier retraso
                                en su recepción.<br>
                                <br>
                                The information contained in this
                                communication is intended solely for the
                                use of the individual or entity to whom
                                it is addressed and others authorized to
                                receive it. It may contain confidential
                                or legally privileged information. If
                                you are not the intended recipient you
                                are hereby notified that any disclosure,
                                copying, distribution or taking any
                                action in reliance on the contents of
                                this information is strictly prohibited
                                and may be unlawful. If you have
                                received this communication in error,
                                please notify us immediately by
                                responding to this email and then delete
                                it from your system. SADAIC is neither
                                liable for the proper and complete
                                transmission of the information
                                contained in this communication nor for
                                any delay in its receipt. </span></p>
                            <br>
                            <fieldset></fieldset>
                            <br>
                            <pre>_______________________________________________
Seguridad mailing list
<a moz-do-not-send="true" href="mailto:Seguridad@lacnic.net" target="_blank">Seguridad@lacnic.net</a>
<a moz-do-not-send="true" href="https://mail.lacnic.net/mailman/listinfo/seguridad" target="_blank">https://mail.lacnic.net/mailman/listinfo/seguridad</a>
</pre>
                          </div>
                        </div>
                      </blockquote>
                      <br>
                      <p>
                      </p>
                      <hr><span class="">
                        _______________________________________________<br>
                        Seguridad mailing list<br>
                        <a moz-do-not-send="true"
                          href="mailto:Seguridad@lacnic.net"
                          target="_blank">Seguridad@lacnic.net</a><br>
                        <a moz-do-not-send="true"
                          href="https://mail.lacnic.net/mailman/listinfo/seguridad"
                          target="_blank">https://mail.lacnic.net/mailman/listinfo/seguridad</a><br>
                      </span></div>
                  </div>
                </div>
              </div>
              <br>
              _______________________________________________<br>
              Seguridad mailing list<br>
              <a moz-do-not-send="true"
                href="mailto:Seguridad@lacnic.net">Seguridad@lacnic.net</a><br>
              <a moz-do-not-send="true"
                href="https://mail.lacnic.net/mailman/listinfo/seguridad"
                target="_blank">https://mail.lacnic.net/mailman/listinfo/seguridad</a><br>
              <br>
            </blockquote>
          </div>
          <br>
          <br clear="all">
          <div><br>
          </div>
          -- <br>
          <div>
            <div dir="ltr">
              <div dir="ltr">
                <div dir="ltr">
                  <div dir="ltr">-----------------------------------------------------------------------------------------------------------------</div>
                </div>
              </div>
            </div>
          </div>
          <span>Campaña contra el correo SPAM</span><br>
          <span>- Solo envia el contenido importante</span><br>
          <span>- Protege y respeta la privacidad de tus amigos.  </span><br>
          <span>- Si reenvias este correo, borra las direcciones
            anteriores  </span><br>
          <span>- Si lo reenvias a varias personas usa la casilla CCO .</span><br>
          <span>- Si todos hacemos lo mismo, tambien tu estaras
            protegid@.</span>
          <div>
            <div dir="ltr">
              <div dir="ltr">
                <div dir="ltr">
                  <div dir="ltr">-----------------------------------------------------------------------------------------------------------------</div>
                </div>
              </div>
            </div>
          </div>
          <div>- Send only the important text </div>
          <div><span>- Protect and respect your friends' privacy</span><br>
          </div>
          <div><span>- </span><span>Delete previous addresses from
              message body</span></div>
          <div><span>- </span><span>Use the BCC field when sending to
              several recipients</span></div>
          <div><span>- If we all follow these guidelines, we'll all be
              protected.</span></div>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
Seguridad mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Seguridad@lacnic.net">Seguridad@lacnic.net</a>
<a class="moz-txt-link-freetext" href="https://mail.lacnic.net/mailman/listinfo/seguridad">https://mail.lacnic.net/mailman/listinfo/seguridad</a>
</pre>
    </blockquote>
    <br>
    <br>
    <pre class="moz-signature" cols="72">-- 
Herman Mereles, Director
Equipo de Respuesta ante Emergencias Cibernéticas (CERT-PY)
Secretaría Nacional de Tecnologías de la Información y Comunicación
SENATICs
Complejo Santos E2 - Gral. Santos 1170 c/ Concordia 
<a class="moz-txt-link-abbreviated" href="mailto:cert@cert.gov.py">cert@cert.gov.py</a> | +595 21 201014 | +595 21 3276902
Asunción - Paraguay | <a class="moz-txt-link-abbreviated" href="http://www.cert.gov.py">www.cert.gov.py</a></pre>
  </body>
</html>