{"id":1059,"date":"2017-09-15T09:02:33","date_gmt":"2017-09-15T14:02:33","guid":{"rendered":"https:\/\/cert.pa\/?p=1059"},"modified":"2017-09-15T09:02:33","modified_gmt":"2017-09-15T14:02:33","slug":"micosoft-libera-actualizaciones-para-82-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1059","title":{"rendered":"Micosoft libera actualizaciones para 82 vulnerabilidades"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2017-09-15 Microsoft libera actualizaciones para 82 vulnerabilidades<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Septiembre 15, 2017<br \/>\nFecha de modificaci\u00f3n: Septiembre 14, 2017<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<br \/>\nSistemas Afectados:<br \/>\nMicrosoft Internet Explorer and Edge<br \/>\nMicrosoft Office<br \/>\n.NET Framework<br \/>\nWindows Kernel<br \/>\nWindows Hyper-V<br \/>\nMicrosoft Windows<br \/>\nMicrosoft Graphics Component<br \/>\nMicrosoft Scripting Engine<br \/>\nWindows DHCP Server<br \/>\nWindows Hyper-V<\/p>\n<p>I. Descripci\u00f3n<br \/>\nMicrosoft ha liberado actualizaciones que cubren 82 vulnerabilidades.<\/p>\n<p>II. Impacto<br \/>\nEstas correcciones o parches estan detalladas en la tabla a continuacion<\/p>\n<table id=\"tableOfContents\" style=\"width:100%\">\n<tbody>\n<tr>\n<th>Product<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8759\" rel=\"nofollow\">CVE-2017-8759<\/a><\/td>\n<td>.NET Framework Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170013\" rel=\"nofollow\">ADV170013<\/a><\/td>\n<td>September 2017 Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8746\" rel=\"nofollow\">CVE-2017-8746<\/a><\/td>\n<td>Device Guard Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>HoloLens<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-9417\" rel=\"nofollow\">CVE-2017-9417<\/a><\/td>\n<td>Broadcom BCM43xx Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8749\" rel=\"nofollow\">CVE-2017-8749<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8747\" rel=\"nofollow\">CVE-2017-8747<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8733\" rel=\"nofollow\">CVE-2017-8733<\/a><\/td>\n<td>Internet Explorer Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Bluetooth Driver<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8628\" rel=\"nofollow\">CVE-2017-8628<\/a><\/td>\n<td>Microsoft Bluetooth Driver Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8736\" rel=\"nofollow\">CVE-2017-8736<\/a><\/td>\n<td>Microsoft Browser Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8750\" rel=\"nofollow\">CVE-2017-8750<\/a><\/td>\n<td>Microsoft Browser Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8757\" rel=\"nofollow\">CVE-2017-8757<\/a><\/td>\n<td>Microsoft Edge Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8597\" rel=\"nofollow\">CVE-2017-8597<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8723\" rel=\"nofollow\">CVE-2017-8723<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11766\" rel=\"nofollow\">CVE-2017-11766<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8643\" rel=\"nofollow\">CVE-2017-8643<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8648\" rel=\"nofollow\">CVE-2017-8648<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8735\" rel=\"nofollow\">CVE-2017-8735<\/a><\/td>\n<td>Microsoft Edge Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8755\" rel=\"nofollow\">CVE-2017-8755<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8754\" rel=\"nofollow\">CVE-2017-8754<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8751\" rel=\"nofollow\">CVE-2017-8751<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8734\" rel=\"nofollow\">CVE-2017-8734<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8724\" rel=\"nofollow\">CVE-2017-8724<\/a><\/td>\n<td>Microsoft Edge Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8731\" rel=\"nofollow\">CVE-2017-8731<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8756\" rel=\"nofollow\">CVE-2017-8756<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11761\" rel=\"nofollow\">CVE-2017-11761<\/a><\/td>\n<td>Microsoft Exchange Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8758\" rel=\"nofollow\">CVE-2017-8758<\/a><\/td>\n<td>Microsoft Exchange Cross-Site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8688\" rel=\"nofollow\">CVE-2017-8688<\/a><\/td>\n<td>Windows GDI+ Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8685\" rel=\"nofollow\">CVE-2017-8685<\/a><\/td>\n<td>Windows GDI+ Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8695\" rel=\"nofollow\">CVE-2017-8695<\/a><\/td>\n<td>Graphics Component Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8683\" rel=\"nofollow\">CVE-2017-8683<\/a><\/td>\n<td>Win32k Graphics Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8696\" rel=\"nofollow\">CVE-2017-8696<\/a><\/td>\n<td>Microsoft Graphics Component Remote Code Execution<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8684\" rel=\"nofollow\">CVE-2017-8684<\/a><\/td>\n<td>Windows GDI+ Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8682\" rel=\"nofollow\">CVE-2017-8682<\/a><\/td>\n<td>Win32k Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8720\" rel=\"nofollow\">CVE-2017-8720<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8676\" rel=\"nofollow\">CVE-2017-8676<\/a><\/td>\n<td>Windows GDI+ Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8632\" rel=\"nofollow\">CVE-2017-8632<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8725\" rel=\"nofollow\">CVE-2017-8725<\/a><\/td>\n<td>Microsoft Office Publisher Remote Code Execution<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8630\" rel=\"nofollow\">CVE-2017-8630<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8743\" rel=\"nofollow\">CVE-2017-8743<\/a><\/td>\n<td>PowerPoint Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8742\" rel=\"nofollow\">CVE-2017-8742<\/a><\/td>\n<td>PowerPoint Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8745\" rel=\"nofollow\">CVE-2017-8745<\/a><\/td>\n<td>Microsoft SharePoint Cross Site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8744\" rel=\"nofollow\">CVE-2017-8744<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8567\" rel=\"nofollow\">CVE-2017-8567<\/a><\/td>\n<td>Microsoft Office Remote Code Execution<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170015\" rel=\"nofollow\">ADV170015<\/a><\/td>\n<td>Microsoft Office Defense in Depth Update<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8629\" rel=\"nofollow\">CVE-2017-8629<\/a><\/td>\n<td>Microsoft SharePoint XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8631\" rel=\"nofollow\">CVE-2017-8631<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8738\" rel=\"nofollow\">CVE-2017-8738<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8729\" rel=\"nofollow\">CVE-2017-8729<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8739\" rel=\"nofollow\">CVE-2017-8739<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8740\" rel=\"nofollow\">CVE-2017-8740<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8741\" rel=\"nofollow\">CVE-2017-8741<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8649\" rel=\"nofollow\">CVE-2017-8649<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8660\" rel=\"nofollow\">CVE-2017-8660<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8748\" rel=\"nofollow\">CVE-2017-8748<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11764\" rel=\"nofollow\">CVE-2017-11764<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8752\" rel=\"nofollow\">CVE-2017-8752<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8753\" rel=\"nofollow\">CVE-2017-8753<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Uniscribe<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8692\" rel=\"nofollow\">CVE-2017-8692<\/a><\/td>\n<td>Uniscribe Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8699\" rel=\"nofollow\">CVE-2017-8699<\/a><\/td>\n<td>Windows Shell Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8710\" rel=\"nofollow\">CVE-2017-8710<\/a><\/td>\n<td>Windows Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8716\" rel=\"nofollow\">CVE-2017-8716<\/a><\/td>\n<td>Windows Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8702\" rel=\"nofollow\">CVE-2017-8702<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows PDF<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8737\" rel=\"nofollow\">CVE-2017-8737<\/a><\/td>\n<td>Microsoft PDF Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows PDF<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8728\" rel=\"nofollow\">CVE-2017-8728<\/a><\/td>\n<td>Microsoft PDF Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows DHCP Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8686\" rel=\"nofollow\">CVE-2017-8686<\/a><\/td>\n<td>Windows DHCP Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8712\" rel=\"nofollow\">CVE-2017-8712<\/a><\/td>\n<td>Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8713\" rel=\"nofollow\">CVE-2017-8713<\/a><\/td>\n<td>Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8714\" rel=\"nofollow\">CVE-2017-8714<\/a><\/td>\n<td>Remote Desktop Virtual Host Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8711\" rel=\"nofollow\">CVE-2017-8711<\/a><\/td>\n<td>Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8707\" rel=\"nofollow\">CVE-2017-8707<\/a><\/td>\n<td>Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8704\" rel=\"nofollow\">CVE-2017-8704<\/a><\/td>\n<td>Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8706\" rel=\"nofollow\">CVE-2017-8706<\/a><\/td>\n<td>Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8719\" rel=\"nofollow\">CVE-2017-8719<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8708\" rel=\"nofollow\">CVE-2017-8708<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8679\" rel=\"nofollow\">CVE-2017-8679<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8709\" rel=\"nofollow\">CVE-2017-8709<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8687\" rel=\"nofollow\">CVE-2017-8687<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8681\" rel=\"nofollow\">CVE-2017-8681<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8675\" rel=\"nofollow\">CVE-2017-8675<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8678\" rel=\"nofollow\">CVE-2017-8678<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8677\" rel=\"nofollow\">CVE-2017-8677<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8680\" rel=\"nofollow\">CVE-2017-8680<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows NetBIOS<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-0161\" rel=\"nofollow\">CVE-2017-0161<\/a><\/td>\n<td>NetBIOS Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar Windows utilizando la herramienta de Windows update o WSUS para Windows server.<br \/>\nhttps:\/\/www.microsoft.com\/en-us\/security\/pc-security\/malware-removal.aspx<br \/>\nInstale los parches tan pronto como est\u00e9n disponibles.<br \/>\nEjecute todo el software con los menos privilegios requeridos mientras se mantiene la funcionalidad.<br \/>\nPara mas referencias seguir el siguiente enlace https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2017-09-15 Microsoft libera actualizaciones para 82 vulnerabilidades Gravedad: Alta Fecha de publicaci\u00f3n: Septiembre 15, 2017 Fecha de modificaci\u00f3n: Septiembre 14, 2017 \u00daltima revisi\u00f3n: Revisi\u00f3n A. https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance Sistemas Afectados: Microsoft Internet Explorer and&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[95,76,43,8,72,44,36,74,21,9,73,64,80,68,45,94],"class_list":["post-1059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-a","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-bolentin","tag-boletin","tag-boletines","tag-internet-explorer","tag-microsoft","tag-parches","tag-seguridad","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1059"}],"version-history":[{"count":3,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1059\/revisions"}],"predecessor-version":[{"id":1062,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1059\/revisions\/1062"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}