{"id":1676,"date":"2019-11-14T15:53:57","date_gmt":"2019-11-14T20:53:57","guid":{"rendered":"https:\/\/cert.pa\/?p=1676"},"modified":"2019-11-14T15:59:47","modified_gmt":"2019-11-14T20:59:47","slug":"csirt-panama-aviso-2019-11-14-microsoft-publica-74-actualizaciones-de-seguridad","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1676","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2019-11-14 Microsoft publica 74 actualizaciones de seguridad"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2019-11-14 Microsoft publica 74 actualizaciones de seguridad<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Noviembre 14, 2019<br>\n\u00daltima revisi\u00f3n: Noviembre 14, 2019<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/164aa83e-499c-e911-a994-000d3a33c573<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nInternet Explorer<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nChakraCore<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nOpen Source Software<br>\nMicrosoft Exchange Server<br>\nVisual Studio<br>\nAzure Stack<\/p>\n\n\n\n<p>I. Descripci\u00f3n<\/p>\n\n\n\n<p>La versi\u00f3n de seguridad de Febrero consiste en actualizaciones de seguridad para los siguientes software:<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1234\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1234<\/a><\/td><td>Azure Stack Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Chipsets<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV190024\" rel=\"noreferrer noopener\" target=\"_blank\">ADV190024<\/a><\/td><td>Microsoft Guidance for Vulnerability in Trusted Platform Module (TPM)<\/td><td>Unknown<\/td><\/tr><tr><td>Graphic Fonts<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1456\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1456<\/a><\/td><td>OpenType Font Parsing Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1413\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1413<\/a><\/td><td>Microsoft Edge Security Feature Bypass Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1373\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1373<\/a><\/td><td>Microsoft Exchange Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1441\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1441<\/a><\/td><td>Win32k Graphics Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1408\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1408<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1439\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1439<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1438\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1438<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1407\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1407<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1394\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1394<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1393\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1393<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1396\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1396<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1395\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1395<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1437\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1437<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1432\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1432<\/a><\/td><td>DirectWrite Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1411\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1411<\/a><\/td><td>DirectWrite Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1440\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1440<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1419\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1419<\/a><\/td><td>OpenType Font Parsing Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1433\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1433<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1436\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1436<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1412\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1412<\/a><\/td><td>OpenType Font Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1434\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1434<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1435\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1435<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1406\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1406<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1445\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1445<\/a><\/td><td>Microsoft Office Online Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1449\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1449<\/a><\/td><td>Microsoft Office ClickToRun Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1446\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1446<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1447\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1447<\/a><\/td><td>Microsoft Office Online Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1402\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1402<\/a><\/td><td>Microsoft Office Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1448\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1448<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1457\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1457<\/a><\/td><td>Microsoft Office Excel Security Feature Bypass<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1443\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1443<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1442\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1442<\/a><\/td><td>Microsoft Office Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft RPC<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1409\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1409<\/a><\/td><td>Windows Remote Procedure Call Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1426\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1426<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1429\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1429<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1427\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1427<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1428\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1428<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1390\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1390<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1383\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1383<\/a><\/td><td>Windows Data Sharing Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1418\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1418<\/a><\/td><td>Windows Modules Installer Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-12207\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2018-12207<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1420\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1420<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1417\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1417<\/a><\/td><td>Windows Data Sharing Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1415\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1415<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1374\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1374<\/a><\/td><td>Windows Error Reporting Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1422\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1422<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1423\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1423<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1424\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1424<\/a><\/td><td>NetLogon Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1382\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1382<\/a><\/td><td>Microsoft ActiveX Installer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1385\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1385<\/a><\/td><td>Windows AppX Deployment Extensions Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1380\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1380<\/a><\/td><td>Microsoft splwow64 Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1388\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1388<\/a><\/td><td>Windows Certificate Dialog Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1391<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1384\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1384<\/a><\/td><td>Microsoft Windows Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1405\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1405<\/a><\/td><td>Windows UPnP Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1381\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1381<\/a><\/td><td>Microsoft Windows Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1379\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1379<\/a><\/td><td>Windows Data Sharing Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1324\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1324<\/a><\/td><td>Windows TCP\/IP Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1370\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1370<\/a><\/td><td>Open Enclave SDK Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Servicing Stack Updates<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV990001\" rel=\"noreferrer noopener\" target=\"_blank\">ADV990001<\/a><\/td><td>Latest Servicing Stack Updates<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1425\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1425<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1398\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1398<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1310\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1310<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0719\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0719<\/a><\/td><td>Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1399\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1399<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1397\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1397<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0712\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0712<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0721\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0721<\/a><\/td><td>Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1389\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1389<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1309\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1309<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1392\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1392<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-11135\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-11135<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1430\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1430<\/a><\/td><td>Microsoft Windows Media Foundation Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Subsystem for Linux<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1416\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1416<\/a><\/td><td>Windows Subsystem for Linux Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>II. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n\n\n\n<p>Se recomienda actualizar los equipos utilizando windows update.<\/p>\n\n\n\n<p>III. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2019-11-14 Microsoft publica 74 actualizaciones de seguridad Gravedad: Alta Fecha de publicaci\u00f3n: Noviembre 14, 2019 \u00daltima revisi\u00f3n: Noviembre 14, 2019 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/164aa83e-499c-e911-a994-000d3a33c573 Sistemas Afectados: Microsoft Windows Internet Explorer Microsoft Edge (EdgeHTML-based) ChakraCore Microsoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1676"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1676\/revisions"}],"predecessor-version":[{"id":1679,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1676\/revisions\/1679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}