{"id":1075,"date":"2017-10-12T08:42:15","date_gmt":"2017-10-12T13:42:15","guid":{"rendered":"https:\/\/cert.pa\/?p=1075"},"modified":"2017-10-12T08:42:15","modified_gmt":"2017-10-12T13:42:15","slug":"microsoft-libera-actualizaciones-para-62-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1075","title":{"rendered":"Microsoft libera actualizaciones para 62 vulnerabilidades"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2017-10-11 Microsoft libera actualizaciones para 62 vulnerabilidades<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Octubre 12, 2017<br \/>\nFecha de modificaci\u00f3n: Octubre 11, 2017<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<\/p>\n<p>https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<br \/>\nSistemas Afectados:<br \/>\nMicrosoft Internet Explorer and Edge<br \/>\nMicrosoft Office<br \/>\n.NET Framework<br \/>\nWindows Kernel<br \/>\nWindows Hyper-V<br \/>\nMicrosoft Windows<br \/>\nMicrosoft Graphics Component<br \/>\nMicrosoft Office<br \/>\nWindows DHCP Server<br \/>\nWindows Hyper-V<br \/>\nWindows NetBIOS<br \/>\nWindows Kernel-Mode Drivers<br \/>\nWindows DHCP Server<br \/>\nMicrosoft Windows PDF<\/p>\n<p>I. Descripci\u00f3n<br \/>\nMicrosoft ha liberado actualizaciones que cubren 82 vulnerabilidades.<\/p>\n<p>II. Impacto<br \/>\nEstas correcciones o parches estan detalladas en la tabla a continuacion<\/p>\n<table id=\"tableOfContents\" style=\"width:100%\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8715\" rel=\"nofollow\">CVE-2017-8715<\/a><\/td>\n<td>Windows Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11823\" rel=\"nofollow\">CVE-2017-11823<\/a><\/td>\n<td>Microsoft Windows Security Feature Bypass<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11790\" rel=\"nofollow\">CVE-2017-11790<\/a><\/td>\n<td>Internet Explorer Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11810\" rel=\"nofollow\">CVE-2017-11810<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11822\" rel=\"nofollow\">CVE-2017-11822<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11813\" rel=\"nofollow\">CVE-2017-11813<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8726\" rel=\"nofollow\">CVE-2017-8726<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11794\" rel=\"nofollow\">CVE-2017-11794<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11816\" rel=\"nofollow\">CVE-2017-11816<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11763\" rel=\"nofollow\">CVE-2017-11763<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11762\" rel=\"nofollow\">CVE-2017-11762<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11824\" rel=\"nofollow\">CVE-2017-11824<\/a><\/td>\n<td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8693\" rel=\"nofollow\">CVE-2017-8693<\/a><\/td>\n<td>Microsoft Graphics Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft JET Database Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8718\" rel=\"nofollow\">CVE-2017-8718<\/a><\/td>\n<td>Microsoft JET Database Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft JET Database Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8717\" rel=\"nofollow\">CVE-2017-8717<\/a><\/td>\n<td>Microsoft JET Database Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11776\" rel=\"nofollow\">CVE-2017-11776<\/a><\/td>\n<td>Microsoft Outlook Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11775\" rel=\"nofollow\">CVE-2017-11775<\/a><\/td>\n<td>Microsoft Office SharePoint XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11774\" rel=\"nofollow\">CVE-2017-11774<\/a><\/td>\n<td>Microsoft Outlook Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11777\" rel=\"nofollow\">CVE-2017-11777<\/a><\/td>\n<td>Microsoft Office SharePoint XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11826\" rel=\"nofollow\">CVE-2017-11826<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11825\" rel=\"nofollow\">CVE-2017-11825<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170017\" rel=\"nofollow\">ADV170017<\/a><\/td>\n<td>Office Defense in Depth Update<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11786\" rel=\"nofollow\">CVE-2017-11786<\/a><\/td>\n<td>Skype for Business Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11820\" rel=\"nofollow\">CVE-2017-11820<\/a><\/td>\n<td>Microsoft Office SharePoint XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11798\" rel=\"nofollow\">CVE-2017-11798<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11799\" rel=\"nofollow\">CVE-2017-11799<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11809\" rel=\"nofollow\">CVE-2017-11809<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11796\" rel=\"nofollow\">CVE-2017-11796<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11797\" rel=\"nofollow\">CVE-2017-11797<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11806\" rel=\"nofollow\">CVE-2017-11806<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11800\" rel=\"nofollow\">CVE-2017-11800<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11808\" rel=\"nofollow\">CVE-2017-11808<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11807\" rel=\"nofollow\">CVE-2017-11807<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11805\" rel=\"nofollow\">CVE-2017-11805<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11804\" rel=\"nofollow\">CVE-2017-11804<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11811\" rel=\"nofollow\">CVE-2017-11811<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11801\" rel=\"nofollow\">CVE-2017-11801<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11802\" rel=\"nofollow\">CVE-2017-11802<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11812\" rel=\"nofollow\">CVE-2017-11812<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11821\" rel=\"nofollow\">CVE-2017-11821<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11793\" rel=\"nofollow\">CVE-2017-11793<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11792\" rel=\"nofollow\">CVE-2017-11792<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11818\" rel=\"nofollow\">CVE-2017-11818<\/a><\/td>\n<td>Windows Storage Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170016\" rel=\"nofollow\">ADV170016<\/a><\/td>\n<td>Windows Server 2008 Defense in Depth<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11783\" rel=\"nofollow\">CVE-2017-11783<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11769\" rel=\"nofollow\">CVE-2017-11769<\/a><\/td>\n<td>TRIE Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows DNS<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11779\" rel=\"nofollow\">CVE-2017-11779<\/a><\/td>\n<td>Windows DNSAPI Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Search Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11772\" rel=\"nofollow\">CVE-2017-11772<\/a><\/td>\n<td>Microsoft Search Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Search Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11771\" rel=\"nofollow\">CVE-2017-11771<\/a><\/td>\n<td>Windows Search Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11784\" rel=\"nofollow\">CVE-2017-11784<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11817\" rel=\"nofollow\">CVE-2017-11817<\/a><\/td>\n<td>Windows Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11814\" rel=\"nofollow\">CVE-2017-11814<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11765\" rel=\"nofollow\">CVE-2017-11765<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11785\" rel=\"nofollow\">CVE-2017-11785<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8694\" rel=\"nofollow\">CVE-2017-8694<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8689\" rel=\"nofollow\">CVE-2017-8689<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows NTLM<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170014\" rel=\"nofollow\">ADV170014<\/a><\/td>\n<td>Optional Windows NTLM SSO authentication changes<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8727\" rel=\"nofollow\">CVE-2017-8727<\/a><\/td>\n<td>Windows Shell Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11819\" rel=\"nofollow\">CVE-2017-11819<\/a><\/td>\n<td>Windows Shell Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows SMB Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11815\" rel=\"nofollow\">CVE-2017-11815<\/a><\/td>\n<td>Windows SMB Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows SMB Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11782\" rel=\"nofollow\">CVE-2017-11782<\/a><\/td>\n<td>Windows SMB Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows SMB Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11781\" rel=\"nofollow\">CVE-2017-11781<\/a><\/td>\n<td>Windows SMB Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows SMB Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11780\" rel=\"nofollow\">CVE-2017-11780<\/a><\/td>\n<td>Windows SMB Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Subsystem for Linux<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8703\" rel=\"nofollow\">CVE-2017-8703<\/a><\/td>\n<td>Windows Subsystem for Linux Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows TPM<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170012\" rel=\"nofollow\">ADV170012<\/a><\/td>\n<td>Vulnerability in TPM could allow Security Feature Bypass<\/td>\n<\/tr>\n<tr>\n<td>Windows Update<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11829\" rel=\"nofollow\">CVE-2017-11829<\/a><\/td>\n<td>Windows Update Delivery Optimization Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar Windows utilizando la herramienta de Windows update o WSUS para Windows server.<br \/>\nhttps:\/\/www.microsoft.com\/en-us\/security\/pc-security\/malware-removal.aspx<br \/>\nInstale los parches tan pronto como est\u00e9n disponibles.<br \/>\nEjecute todo el software con los menos privilegios requeridos mientras se mantiene la funcionalidad.<br \/>\nPara mas referencias seguir el siguiente enlace https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2017-10-11 Microsoft libera actualizaciones para 62 vulnerabilidades Gravedad: Alta Fecha de publicaci\u00f3n: Octubre 12, 2017 Fecha de modificaci\u00f3n: Octubre 11, 2017 \u00daltima revisi\u00f3n: Revisi\u00f3n A. https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance Sistemas Afectados: Microsoft Internet Explorer and&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,72,36,74,99,21,9,92,73,98,68],"class_list":["post-1075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos-de-seguridad","tag-boletin","tag-boletines","tag-edge","tag-internet-explorer","tag-microsoft","tag-office","tag-parches","tag-patch-tuesday","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1075"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1075\/revisions"}],"predecessor-version":[{"id":1077,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1075\/revisions\/1077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}