Alert GCSA-13041 - Bollettino di Sicurezza Microsoft Luglio 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13041
Data : 10 Luglio 2013
Titolo : Bollettino di Sicurezza Microsoft Luglio 2013
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 7 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi Windows
e in altre applicazioni:
MS13-052 Vulnerabilita' in .NET Framework e Silverlight
MS13-053 Vulnerabilita' nei driver in modalita' kernel di Windows
MS13-054 Vulnerabilita' in GDI+
MS13-055 Aggiornamento cumulativo per la protezione di Internet Explorer
MS13-056 Vulnerabilita' in Microsoft DirectShow
MS13-057 Vulnerabilita' in Runtime formato Windows Media
MS13-058 Vulnerabilita' in Windows Defender
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Microsoft .NET Framework
Microsoft Silverlight
Microsoft Office
Microsoft Visual Studio
Microsoft Lync
Internet Explorer
Windows Defender
:: Impatto
Acquisizione di privilegi piu' elevati
Esecuzione di codice in modalita' remota
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza - Luglio 2013
http://technet.microsoft.com/it-it/security/bulletin/ms13-jul
Bollettini Microsoft sulla sicurezza
http://technet.microsoft.com/it-it/security/bulletin/MS13-052
http://technet.microsoft.com/it-it/security/bulletin/MS13-053
http://technet.microsoft.com/it-it/security/bulletin/MS13-054
http://technet.microsoft.com/it-it/security/bulletin/MS13-055
http://technet.microsoft.com/it-it/security/bulletin/MS13-056
http://technet.microsoft.com/it-it/security/bulletin/MS13-057
http://technet.microsoft.com/it-it/security/bulletin/MS13-058
Microsoft Knowledge Base
http://support.microsoft.com/kb/2861561
http://support.microsoft.com/kb/2850851
http://support.microsoft.com/kb/2848295
http://support.microsoft.com/kb/2846071
http://support.microsoft.com/kb/2845187
http://support.microsoft.com/kb/2847883
http://support.microsoft.com/kb/2847927
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3171
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1300
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3660
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3154
SANS ISC Diary
http://isc.sans.edu/diary.html?storyid=16126
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iD8DBQFR3XbrwZxMk2USYEIRAuHaAKCc3gn+53yb720Am2mOpU4v3cFcLwCeKGnJ
PY791KceS8wWjF/zXyxtQgc=
=U/iW
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-13041
Data : 10 Luglio 2013
Titolo : Bollettino di Sicurezza Microsoft Luglio 2013
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 7 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi Windows
e in altre applicazioni:
MS13-052 Vulnerabilita' in .NET Framework e Silverlight
MS13-053 Vulnerabilita' nei driver in modalita' kernel di Windows
MS13-054 Vulnerabilita' in GDI+
MS13-055 Aggiornamento cumulativo per la protezione di Internet Explorer
MS13-056 Vulnerabilita' in Microsoft DirectShow
MS13-057 Vulnerabilita' in Runtime formato Windows Media
MS13-058 Vulnerabilita' in Windows Defender
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Microsoft .NET Framework
Microsoft Silverlight
Microsoft Office
Microsoft Visual Studio
Microsoft Lync
Internet Explorer
Windows Defender
:: Impatto
Acquisizione di privilegi piu' elevati
Esecuzione di codice in modalita' remota
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza - Luglio 2013
http://technet.microsoft.com/it-it/security/bulletin/ms13-jul
Bollettini Microsoft sulla sicurezza
http://technet.microsoft.com/it-it/security/bulletin/MS13-052
http://technet.microsoft.com/it-it/security/bulletin/MS13-053
http://technet.microsoft.com/it-it/security/bulletin/MS13-054
http://technet.microsoft.com/it-it/security/bulletin/MS13-055
http://technet.microsoft.com/it-it/security/bulletin/MS13-056
http://technet.microsoft.com/it-it/security/bulletin/MS13-057
http://technet.microsoft.com/it-it/security/bulletin/MS13-058
Microsoft Knowledge Base
http://support.microsoft.com/kb/2861561
http://support.microsoft.com/kb/2850851
http://support.microsoft.com/kb/2848295
http://support.microsoft.com/kb/2846071
http://support.microsoft.com/kb/2845187
http://support.microsoft.com/kb/2847883
http://support.microsoft.com/kb/2847927
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3134
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3171
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1300
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3660
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3147
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3154
SANS ISC Diary
http://isc.sans.edu/diary.html?storyid=16126
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iD8DBQFR3XbrwZxMk2USYEIRAuHaAKCc3gn+53yb720Am2mOpU4v3cFcLwCeKGnJ
PY791KceS8wWjF/zXyxtQgc=
=U/iW
-----END PGP SIGNATURE-----