Alert GCSA-13021 - Bollettino di Sicurezza Microsoft Marzo 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13021
Data : 14 Marzo 2013
Titolo : Bollettino di Sicurezza Microsoft Marzo 2013
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 12 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi e applicazioni
Windows:
MS13-021 Cumulative Security Update for Internet Explorer (2809289)
MS13-022 Vulnerability in Silverlight Could Allow Remote Code
Execution (2814124)
MS13-023 Vulnerability in Microsoft Visio Viewer 2010 Could Allow
Remote Code Execution (2801261)
MS13-024 Vulnerabilities in SharePoint Could Allow Elevation of
Privilege (2780176)
MS13-025 Vulnerability in Microsoft OneNote Could Allow
Information Disclosure (2816264)
MS13-026 Vulnerability in Office Outlook for Mac Could Allow
Information Disclosure (2813682)
MS13-027 Vulnerabilities in Kernel-Mode Drivers Could Allow
Elevation Of Privilege (2807986)
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Microsoft Internet Explorer
Microsoft Office
Microsoft Server Software
Microsoft Silverlight
:: Impatto
Esecuzione di codice in modalita' remota
Acquisizione di privilegi pi elevati
Elusione della funzione di protezione
Attacco di tipo Denial of Service
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza - Marzo 2013
http://technet.microsoft.com/it-it/security/bulletin/ms13-mar
Bollettini Microsoft sulla sicurezza
http://technet.microsoft.com/it-it/security/bulletin/ms13-021
http://technet.microsoft.com/it-it/security/bulletin/ms13-022
http://technet.microsoft.com/it-it/security/bulletin/ms13-023
http://technet.microsoft.com/it-it/security/bulletin/ms13-024
http://technet.microsoft.com/it-it/security/bulletin/ms13-025
http://technet.microsoft.com/it-it/security/bulletin/ms13-026
http://technet.microsoft.com/it-it/security/bulletin/ms13-027
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
Mitre CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0087
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0088
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0089
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0090
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0091
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0092
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0093
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0094
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1288
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0074
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0079
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0080
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0083
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0084
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0085
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0086
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0095
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1285
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1286
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1287
SANS ISC Diary
https://isc.sans.edu/diary.html?storyid=15385
US-CERT Alert TA13-071A
http://www.us-cert.gov/ncas/alerts/TA13-071A
GARR CERT Security Alert - subscribe/unsubscribe: http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlFB4XEACgkQwZxMk2USYEJ/JACgvI3ECQZYHJYQ5iyVjNNb7zal
eHsAoJFEd+Dty/TkvzQD/FcV6tKHIO2x
=OHuf
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13021
Data : 14 Marzo 2013
Titolo : Bollettino di Sicurezza Microsoft Marzo 2013
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 12 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi e applicazioni
Windows:
MS13-021 Cumulative Security Update for Internet Explorer (2809289)
MS13-022 Vulnerability in Silverlight Could Allow Remote Code
Execution (2814124)
MS13-023 Vulnerability in Microsoft Visio Viewer 2010 Could Allow
Remote Code Execution (2801261)
MS13-024 Vulnerabilities in SharePoint Could Allow Elevation of
Privilege (2780176)
MS13-025 Vulnerability in Microsoft OneNote Could Allow
Information Disclosure (2816264)
MS13-026 Vulnerability in Office Outlook for Mac Could Allow
Information Disclosure (2813682)
MS13-027 Vulnerabilities in Kernel-Mode Drivers Could Allow
Elevation Of Privilege (2807986)
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Microsoft Internet Explorer
Microsoft Office
Microsoft Server Software
Microsoft Silverlight
:: Impatto
Esecuzione di codice in modalita' remota
Acquisizione di privilegi pi elevati
Elusione della funzione di protezione
Attacco di tipo Denial of Service
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza - Marzo 2013
http://technet.microsoft.com/it-it/security/bulletin/ms13-mar
Bollettini Microsoft sulla sicurezza
http://technet.microsoft.com/it-it/security/bulletin/ms13-021
http://technet.microsoft.com/it-it/security/bulletin/ms13-022
http://technet.microsoft.com/it-it/security/bulletin/ms13-023
http://technet.microsoft.com/it-it/security/bulletin/ms13-024
http://technet.microsoft.com/it-it/security/bulletin/ms13-025
http://technet.microsoft.com/it-it/security/bulletin/ms13-026
http://technet.microsoft.com/it-it/security/bulletin/ms13-027
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
Mitre CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0087
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0088
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0089
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0090
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0091
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0092
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0093
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0094
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1288
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0074
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0079
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0080
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0083
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0084
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0085
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0086
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0095
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1285
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1286
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1287
SANS ISC Diary
https://isc.sans.edu/diary.html?storyid=15385
US-CERT Alert TA13-071A
http://www.us-cert.gov/ncas/alerts/TA13-071A
GARR CERT Security Alert - subscribe/unsubscribe: http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlFB4XEACgkQwZxMk2USYEJ/JACgvI3ECQZYHJYQ5iyVjNNb7zal
eHsAoJFEd+Dty/TkvzQD/FcV6tKHIO2x
=OHuf
-----END PGP SIGNATURE-----