Alert GCSA-13048 - Bollettino di Sicurezza Microsoft Settembre 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13048
Data : 17 Settembre 2013
Titolo : Bollettino di Sicurezza Microsoft Settembre 2013
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 13 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi Windows
e in altre applicazioni:
MS13-067 Vulnerabilita' in Microsoft SharePoint Server
MS13-068 Vulnerabilita' in Microsoft Outlook
MS13-069 Aggiornamento cumulativo Internet Explorer
MS13-070 Vulnerabilita' in OLE
MS13-071 Vulnerabilita' nel file dei temi di Windows
MS13-072 Vulnerabilita' in Microsoft Office
MS13-073 Vulnerabilita' di Microsoft Excel
MS13-074 Vulnerabilita' in Microsoft Access
MS13-075 Vulnerabilita' in Microsoft Office IME (cinese)
MS13-076 Vulnerabilita' nei driver in modalita' kernel
MS13-077 Vulnerabilita' nella Gestione controllo servizi di Windows
MS13-078 Vulnerabilita' in FrontPage
MS13-079 Vulnerabilita' in Active Directory
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows (Internet Explorer)
Microsoft Outlook
Microsoft Office
Microsoft SharePoint Server
Microsoft FrontPage
Microsoft Active Directory
:: Impatto
Esecuzione di codice in modalita' remota
Acquisizione di privilegi piu' elevati
Denial of Service
Rivelazione e intercettazione di dati sensibili
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza - Settembre 2013
http://technet.microsoft.com/it-it/security/bulletin/ms13-sep
Bollettini Microsoft sulla sicurezza
http://technet.microsoft.com/it-it/security/bulletin/MS13-067
http://technet.microsoft.com/it-it/security/bulletin/MS13-068
http://technet.microsoft.com/it-it/security/bulletin/MS13-069
http://technet.microsoft.com/it-it/security/bulletin/MS13-070
http://technet.microsoft.com/it-it/security/bulletin/MS13-071
http://technet.microsoft.com/it-it/security/bulletin/MS13-072
http://technet.microsoft.com/it-it/security/bulletin/MS13-073
http://technet.microsoft.com/it-it/security/bulletin/MS13-074
http://technet.microsoft.com/it-it/security/bulletin/MS13-075
http://technet.microsoft.com/it-it/security/bulletin/MS13-076
http://technet.microsoft.com/it-it/security/bulletin/MS13-077
http://technet.microsoft.com/it-it/security/bulletin/MS13-078
http://technet.microsoft.com/it-it/security/bulletin/MS13-079
Microsoft Knowledge Base
http://support.microsoft.com/kb/2834052
http://support.microsoft.com/kb/2756473
http://support.microsoft.com/kb/2870699
http://support.microsoft.com/kb/2876217
http://support.microsoft.com/kb/2864063
http://support.microsoft.com/kb/2845537
http://support.microsoft.com/kb/2858300
http://support.microsoft.com/kb/2848637
http://support.microsoft.com/kb/2878687
http://support.microsoft.com/kb/2876315
http://support.microsoft.com/kb/2872339
http://support.microsoft.com/kb/2825621
http://support.microsoft.com/kb/2853587
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
ISC SANS
http://isc.sans.edu/diary.html?storyid=16538
Mitre CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0081
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0810
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1315
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1330
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1341
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1342
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1343
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1344
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3137
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3155
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3156
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3157
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3158
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3159
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3160
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3179
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3180
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3201
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3202
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3203
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3204
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3205
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3206
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3207
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3208
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3209
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3845
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3847
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3848
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3849
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3850
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3851
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3852
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3853
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3854
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3855
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3856
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3857
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3858
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3859
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3862
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3863
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3864
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3865
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3866
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3868
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3870
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlI4IlYACgkQwZxMk2USYEJOhwCg2UOyVj0KTeyZaSFVS7VunCk3
ZtwAnjw7kv3A8fE9vLSRPkUUKXlD6qC3
=3SuT
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13048
Data : 17 Settembre 2013
Titolo : Bollettino di Sicurezza Microsoft Settembre 2013
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 13 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi Windows
e in altre applicazioni:
MS13-067 Vulnerabilita' in Microsoft SharePoint Server
MS13-068 Vulnerabilita' in Microsoft Outlook
MS13-069 Aggiornamento cumulativo Internet Explorer
MS13-070 Vulnerabilita' in OLE
MS13-071 Vulnerabilita' nel file dei temi di Windows
MS13-072 Vulnerabilita' in Microsoft Office
MS13-073 Vulnerabilita' di Microsoft Excel
MS13-074 Vulnerabilita' in Microsoft Access
MS13-075 Vulnerabilita' in Microsoft Office IME (cinese)
MS13-076 Vulnerabilita' nei driver in modalita' kernel
MS13-077 Vulnerabilita' nella Gestione controllo servizi di Windows
MS13-078 Vulnerabilita' in FrontPage
MS13-079 Vulnerabilita' in Active Directory
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows (Internet Explorer)
Microsoft Outlook
Microsoft Office
Microsoft SharePoint Server
Microsoft FrontPage
Microsoft Active Directory
:: Impatto
Esecuzione di codice in modalita' remota
Acquisizione di privilegi piu' elevati
Denial of Service
Rivelazione e intercettazione di dati sensibili
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza - Settembre 2013
http://technet.microsoft.com/it-it/security/bulletin/ms13-sep
Bollettini Microsoft sulla sicurezza
http://technet.microsoft.com/it-it/security/bulletin/MS13-067
http://technet.microsoft.com/it-it/security/bulletin/MS13-068
http://technet.microsoft.com/it-it/security/bulletin/MS13-069
http://technet.microsoft.com/it-it/security/bulletin/MS13-070
http://technet.microsoft.com/it-it/security/bulletin/MS13-071
http://technet.microsoft.com/it-it/security/bulletin/MS13-072
http://technet.microsoft.com/it-it/security/bulletin/MS13-073
http://technet.microsoft.com/it-it/security/bulletin/MS13-074
http://technet.microsoft.com/it-it/security/bulletin/MS13-075
http://technet.microsoft.com/it-it/security/bulletin/MS13-076
http://technet.microsoft.com/it-it/security/bulletin/MS13-077
http://technet.microsoft.com/it-it/security/bulletin/MS13-078
http://technet.microsoft.com/it-it/security/bulletin/MS13-079
Microsoft Knowledge Base
http://support.microsoft.com/kb/2834052
http://support.microsoft.com/kb/2756473
http://support.microsoft.com/kb/2870699
http://support.microsoft.com/kb/2876217
http://support.microsoft.com/kb/2864063
http://support.microsoft.com/kb/2845537
http://support.microsoft.com/kb/2858300
http://support.microsoft.com/kb/2848637
http://support.microsoft.com/kb/2878687
http://support.microsoft.com/kb/2876315
http://support.microsoft.com/kb/2872339
http://support.microsoft.com/kb/2825621
http://support.microsoft.com/kb/2853587
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
ISC SANS
http://isc.sans.edu/diary.html?storyid=16538
Mitre CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0081
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0810
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1315
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1330
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1341
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1342
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1343
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1344
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3137
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3155
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3156
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3157
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3158
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3159
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3160
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3179
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3180
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3201
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3202
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3203
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3204
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3205
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3206
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3207
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3208
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3209
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3845
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3847
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3848
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3849
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3850
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3851
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3852
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3853
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3854
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3855
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3856
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3857
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3858
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3859
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3862
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3863
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3864
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3865
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3866
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3868
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3870
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlI4IlYACgkQwZxMk2USYEJOhwCg2UOyVj0KTeyZaSFVS7VunCk3
ZtwAnjw7kv3A8fE9vLSRPkUUKXlD6qC3
=3SuT
-----END PGP SIGNATURE-----