Alert GCSA-19116 Microsoft Security Update Novembre 2019
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-19116
Data: 13 Novembre 2019
Titolo: Microsoft Security Update Novembre 2019
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato vari aggiornamenti mirati a risolvere potenziali
vulnerabilita' presenti nei sistemi operativi Windows e in alcuni
software applicativi.
Maggiori dettagli sono disponibili nella segnalazione ufficiale
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Internet Explorer
Microsoft Edge (EdgeHTML-based)
ChakraCore
Microsoft Office and Microsoft Office Services and Web Apps
Open Source Software
Microsoft Exchange Server
Visual Studio
Azure Stack
:: Impatto
Un attaccante remoto puo' sfruttare alcune delle vulnerabilita' per
prendere il controllo del sistema che ne e' affetto.
:: Soluzioni
Per default l'installazione degli aggiornamenti avviene in maniera
automatica.
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance/
Gli aggiornamenti sono disponibili anche tramite il catalogo di
Microsoft Update
https://www.catalog.update.microsoft.com/Home.aspx
:: Riferimenti
November 2019 Security Updates
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/164aa83e-499c-e911-a994-000d3a33c573
Microsoft Security update deployment information: November 12, 2019
https://support.microsoft.com/en-us/help/20191112/security-update-deployment-information-november-12-2019
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance
US-CERT
https://www.us-cert.gov/ncas/current-activity/2019/11/12/microsoft-releases-november-2019-security-updates
SANS ISC InfoSec Forum
https://isc.sans.org/forums/diary/November+2019+Microsoft+Patch+Tuesday/25516/
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXcvmggAKCRDBnEyTZRJg
QmZsAJ9XoVy8EX1ugjmVv92X046SGqM+fQCgxxNahSJKjNbEvVh+eKezcxSAgCY=
=pnqd
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-19116
Data: 13 Novembre 2019
Titolo: Microsoft Security Update Novembre 2019
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato vari aggiornamenti mirati a risolvere potenziali
vulnerabilita' presenti nei sistemi operativi Windows e in alcuni
software applicativi.
Maggiori dettagli sono disponibili nella segnalazione ufficiale
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Internet Explorer
Microsoft Edge (EdgeHTML-based)
ChakraCore
Microsoft Office and Microsoft Office Services and Web Apps
Open Source Software
Microsoft Exchange Server
Visual Studio
Azure Stack
:: Impatto
Un attaccante remoto puo' sfruttare alcune delle vulnerabilita' per
prendere il controllo del sistema che ne e' affetto.
:: Soluzioni
Per default l'installazione degli aggiornamenti avviene in maniera
automatica.
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance/
Gli aggiornamenti sono disponibili anche tramite il catalogo di
Microsoft Update
https://www.catalog.update.microsoft.com/Home.aspx
:: Riferimenti
November 2019 Security Updates
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/164aa83e-499c-e911-a994-000d3a33c573
Microsoft Security update deployment information: November 12, 2019
https://support.microsoft.com/en-us/help/20191112/security-update-deployment-information-november-12-2019
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance
US-CERT
https://www.us-cert.gov/ncas/current-activity/2019/11/12/microsoft-releases-november-2019-security-updates
SANS ISC InfoSec Forum
https://isc.sans.org/forums/diary/November+2019+Microsoft+Patch+Tuesday/25516/
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXcvmggAKCRDBnEyTZRJg
QmZsAJ9XoVy8EX1ugjmVv92X046SGqM+fQCgxxNahSJKjNbEvVh+eKezcxSAgCY=
=pnqd
-----END PGP SIGNATURE-----