Alert GCSA-18004 - Microsoft Security Update Gennaio 2018
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-18004
Data: 10 Gennaio 2018
Titolo: Microsoft Security Update Gennaio 2018
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato nuovi aggiornamenti mirati a risolvere
le vulnerabilità presenti nei sistemi operativi Windows e in vari
software applicativi.
Maggiori dettagli sono disponibili nella segnalazione
ufficiale alla sezione "Riferimenti".
:: Software interessato
Internet Explorer
Microsoft Edge
Microsoft Windows
Microsoft Office and Microsoft Office Services and Web Apps
SQL Server
ChakraCore
.NET Framework
.NET Core
ASP.NET Core
Adobe Flash
:: Impatto
Esecuzione di codice arbitrario
Accesso al sistema
Accesso con privilegi utente
Information Disclosure
Modifica di informazioni utente e di sistema
:: Soluzioni
Per default l'installazione degli aggiornamenti avviene in
maniera automatica.
Windows Update domande frequenti
https://support.microsoft.com/it-it/help/12373/windows-update-faq
Ulteriori dettagli e known issues nella sezione "Release Notes":
https://portal.msrc.microsoft.com/en-us/security-guidance
:: Riferimenti
Microsoft Security Update Summary
https://portal.msrc.microsoft.com/en-us/security-guidance/summary
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/858123b8-25ca-e711-a957-000d3a33cf99
Microsoft Security Advisories
https://technet.microsoft.com/library/security/4056318
SANS ISC
https://isc.sans.edu/forums/diary/Microsoft+January+2018+Patch+Tuesday/23217/
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0764
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0795
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0793
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0773
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0781
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0751
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0746
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0745
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0743
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlpV6VgACgkQwZxMk2USYELiwgCdFhLXR0Vwftbz60gpSNhvkwtf
KbYAoIErZcEUFY3iDHcYxXK0wXFIdjqO
=/uUi
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-18004
Data: 10 Gennaio 2018
Titolo: Microsoft Security Update Gennaio 2018
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato nuovi aggiornamenti mirati a risolvere
le vulnerabilità presenti nei sistemi operativi Windows e in vari
software applicativi.
Maggiori dettagli sono disponibili nella segnalazione
ufficiale alla sezione "Riferimenti".
:: Software interessato
Internet Explorer
Microsoft Edge
Microsoft Windows
Microsoft Office and Microsoft Office Services and Web Apps
SQL Server
ChakraCore
.NET Framework
.NET Core
ASP.NET Core
Adobe Flash
:: Impatto
Esecuzione di codice arbitrario
Accesso al sistema
Accesso con privilegi utente
Information Disclosure
Modifica di informazioni utente e di sistema
:: Soluzioni
Per default l'installazione degli aggiornamenti avviene in
maniera automatica.
Windows Update domande frequenti
https://support.microsoft.com/it-it/help/12373/windows-update-faq
Ulteriori dettagli e known issues nella sezione "Release Notes":
https://portal.msrc.microsoft.com/en-us/security-guidance
:: Riferimenti
Microsoft Security Update Summary
https://portal.msrc.microsoft.com/en-us/security-guidance/summary
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/858123b8-25ca-e711-a957-000d3a33cf99
Microsoft Security Advisories
https://technet.microsoft.com/library/security/4056318
SANS ISC
https://isc.sans.edu/forums/diary/Microsoft+January+2018+Patch+Tuesday/23217/
Mitre CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0764
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0785
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0784
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0795
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0791
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0793
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0812
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0805
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0806
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0807
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0754
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0800
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0780
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0773
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0781
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0762
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0778
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0818
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0819
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0748
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0751
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0746
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0747
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0745
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0743
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAlpV6VgACgkQwZxMk2USYELiwgCdFhLXR0Vwftbz60gpSNhvkwtf
KbYAoIErZcEUFY3iDHcYxXK0wXFIdjqO
=/uUi
-----END PGP SIGNATURE-----