Alert GCSA-12031 - Microsoft Security Bullettin June 2012
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-12031
Data : 13 Giugno 2012
Titolo : Microsoft Security Bullettin June 2012
******************************************************************
:: Descrizione:
Microsoft ha rilasciato 7 bollettini di sicurezza relativi a varie
vulnerabilita' presenti nei sistemi operativi Windows e in altre applicazioni:
MS12-036 Vulnerability in Remote Desktop Could Allow Remote Code Execution (2685939)
MS12-037 Cumulative Security Update for Internet Explorer (2699988)
MS12-038 Vulnerability in .NET Framework Could Allow Remote Code Execution (2706726)
MS12-039 Vulnerabilities in Lync Could Allow Remote Code Execution (2707956)
MS12-040 Vulnerability in Microsoft Dynamics AX Enterprise Portal Could Allow Elevation of Privilege (2709100)
MS12-041 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2709162)
MS12-042 Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2711167)
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato:
Microsoft Windows
Microsoft Internet Explorer
Microsoft .NET Framework
Microsoft Dynamics AX
Microsoft Lync
Microsoft Office Communicator
:: Impatto:
Esecuzione remota di codice arbitrario
Acquisizione di privilegi piu' elevati
Cross Site Scripting
Accesso al sistema
:: Soluzioni:
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
https://www.update.microsoft.com/
:: Riferimenti:
Riepilogo dei bollettini Microsoft sulla sicurezza - giugno 2012:
http://technet.microsoft.com/it-it/security/bulletin/ms12-jun
Bollettini Microsoft sulla sicurezza:
http://technet.microsoft.com/it-it/security/bulletin/ms12-036
http://technet.microsoft.com/it-it/security/bulletin/ms12-037
http://technet.microsoft.com/it-it/security/bulletin/ms12-038
http://technet.microsoft.com/it-it/security/bulletin/ms12-039
http://technet.microsoft.com/it-it/security/bulletin/ms12-040
http://technet.microsoft.com/it-it/security/bulletin/ms12-041
http://technet.microsoft.com/it-it/security/bulletin/ms12-042
Secunia:
http://secunia.com/advisories/49412/
http://secunia.com/advisories/48429/
http://secunia.com/advisories/49418/
http://secunia.com/advisories/49433/
http://secunia.com/advisories/49384/
http://secunia.com/advisories/49436/
http://secunia.com/advisories/49454/
Mitre CVE ID:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1523
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1873
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1874
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1876
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1877
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1878
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1880
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1865
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1866
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1515
-----BEGIN PGP SIGNATURE-----
iD8DBQFP2HXhwZxMk2USYEIRAsHDAKDUoLzy3gK1OxFk8b0lZiUPbjE8BACeMVq8
6tj5orkf8xxlPgI95v2GSp8=
=967z
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-12031
Data : 13 Giugno 2012
Titolo : Microsoft Security Bullettin June 2012
******************************************************************
:: Descrizione:
Microsoft ha rilasciato 7 bollettini di sicurezza relativi a varie
vulnerabilita' presenti nei sistemi operativi Windows e in altre applicazioni:
MS12-036 Vulnerability in Remote Desktop Could Allow Remote Code Execution (2685939)
MS12-037 Cumulative Security Update for Internet Explorer (2699988)
MS12-038 Vulnerability in .NET Framework Could Allow Remote Code Execution (2706726)
MS12-039 Vulnerabilities in Lync Could Allow Remote Code Execution (2707956)
MS12-040 Vulnerability in Microsoft Dynamics AX Enterprise Portal Could Allow Elevation of Privilege (2709100)
MS12-041 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2709162)
MS12-042 Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2711167)
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato:
Microsoft Windows
Microsoft Internet Explorer
Microsoft .NET Framework
Microsoft Dynamics AX
Microsoft Lync
Microsoft Office Communicator
:: Impatto:
Esecuzione remota di codice arbitrario
Acquisizione di privilegi piu' elevati
Cross Site Scripting
Accesso al sistema
:: Soluzioni:
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
https://www.update.microsoft.com/
:: Riferimenti:
Riepilogo dei bollettini Microsoft sulla sicurezza - giugno 2012:
http://technet.microsoft.com/it-it/security/bulletin/ms12-jun
Bollettini Microsoft sulla sicurezza:
http://technet.microsoft.com/it-it/security/bulletin/ms12-036
http://technet.microsoft.com/it-it/security/bulletin/ms12-037
http://technet.microsoft.com/it-it/security/bulletin/ms12-038
http://technet.microsoft.com/it-it/security/bulletin/ms12-039
http://technet.microsoft.com/it-it/security/bulletin/ms12-040
http://technet.microsoft.com/it-it/security/bulletin/ms12-041
http://technet.microsoft.com/it-it/security/bulletin/ms12-042
Secunia:
http://secunia.com/advisories/49412/
http://secunia.com/advisories/48429/
http://secunia.com/advisories/49418/
http://secunia.com/advisories/49433/
http://secunia.com/advisories/49384/
http://secunia.com/advisories/49436/
http://secunia.com/advisories/49454/
Mitre CVE ID:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1523
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1872
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1873
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1874
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1876
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1877
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1878
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1880
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1882
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3402
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0159
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1864
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1865
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1866
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1515
-----BEGIN PGP SIGNATURE-----
iD8DBQFP2HXhwZxMk2USYEIRAsHDAKDUoLzy3gK1OxFk8b0lZiUPbjE8BACeMVq8
6tj5orkf8xxlPgI95v2GSp8=
=967z
-----END PGP SIGNATURE-----