Alert GCSA-19121 Microsoft Security Update Dicembre 2019
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-19121
Data: 12 Dicembre 2019
Titolo: Microsoft Security Update Dicembre 2019
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato vari aggiornamenti mirati a risolvere potenziali
vulnerabilita' presenti nei sistemi operativi Windows e in alcuni
software applicativi.
Maggiori dettagli sono disponibili nella segnalazione ufficiale
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Internet Explorer
Microsoft Office and Microsoft Office Services and Web Apps
SQL Server
Visual Studio
Skype for Business
:: Impatto
Esecuzione di codice arbitrario sia da locale che da remoto
Compromissione totale controllo di un sistema
:: Soluzioni
Per default l'installazione degli aggiornamenti avviene in maniera
automatica.
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance/
Gli aggiornamenti sono disponibili anche tramite il catalogo di
Microsoft Update
https://www.catalog.update.microsoft.com/Home.aspx
:: Riferimenti
December 2019 Security Updates
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2019-Dec
Microsoft Security update deployment information: November 12, 2019
https://support.microsoft.com/en-us/help/20191210/security-update-deployment-information-december-10-2019
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance
US-CERT
https://www.us-cert.gov/ncas/current-activity/2019/12/10/microsoft-releases-december-2019-security-updates
SANS ISC InfoSec Forum
https://isc.sans.edu/forums/diary/Microsoft+December+2019+Patch+Tuesday/25592/
CERT Nazionale
https://www.certnazionale.it/news/2019/12/11/aggiornamenti-di-sicurezza-per-prodotti-microsoft-dicembre-2019/
CERT-PA
https://www.cert-pa.it/notizie/rilascio-aggiornamenti-di-sicurezza-microsoft-adobe-e-chrome-dicembre-2019/
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1485
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXfIz2AAKCRDBnEyTZRJg
QpQIAKCEf7v+ggsK+0rLfKrug33vqj5HcgCfRrISoXx4THf1dg3MgoWpLp5oXuU=
=epwW
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-19121
Data: 12 Dicembre 2019
Titolo: Microsoft Security Update Dicembre 2019
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato vari aggiornamenti mirati a risolvere potenziali
vulnerabilita' presenti nei sistemi operativi Windows e in alcuni
software applicativi.
Maggiori dettagli sono disponibili nella segnalazione ufficiale
alla sezione "Riferimenti".
:: Software interessato
Microsoft Windows
Internet Explorer
Microsoft Office and Microsoft Office Services and Web Apps
SQL Server
Visual Studio
Skype for Business
:: Impatto
Esecuzione di codice arbitrario sia da locale che da remoto
Compromissione totale controllo di un sistema
:: Soluzioni
Per default l'installazione degli aggiornamenti avviene in maniera
automatica.
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance/
Gli aggiornamenti sono disponibili anche tramite il catalogo di
Microsoft Update
https://www.catalog.update.microsoft.com/Home.aspx
:: Riferimenti
December 2019 Security Updates
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2019-Dec
Microsoft Security update deployment information: November 12, 2019
https://support.microsoft.com/en-us/help/20191210/security-update-deployment-information-december-10-2019
Microsoft Security Update Guide
https://portal.msrc.microsoft.com/en-us/security-guidance
US-CERT
https://www.us-cert.gov/ncas/current-activity/2019/12/10/microsoft-releases-december-2019-security-updates
SANS ISC InfoSec Forum
https://isc.sans.edu/forums/diary/Microsoft+December+2019+Patch+Tuesday/25592/
CERT Nazionale
https://www.certnazionale.it/news/2019/12/11/aggiornamenti-di-sicurezza-per-prodotti-microsoft-dicembre-2019/
CERT-PA
https://www.cert-pa.it/notizie/rilascio-aggiornamenti-di-sicurezza-microsoft-adobe-e-chrome-dicembre-2019/
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1485
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXfIz2AAKCRDBnEyTZRJg
QpQIAKCEf7v+ggsK+0rLfKrug33vqj5HcgCfRrISoXx4THf1dg3MgoWpLp5oXuU=
=epwW
-----END PGP SIGNATURE-----