{"id":1727,"date":"2019-12-12T14:49:09","date_gmt":"2019-12-12T19:49:09","guid":{"rendered":"https:\/\/cert.pa\/?p=1727"},"modified":"2023-01-24T09:55:25","modified_gmt":"2023-01-24T14:55:25","slug":"csirt-panama-aviso-2019-12-12-microsoft-libera-sus-actualizaciones-de-diciembre-que-corrigen-el-zero-day-win32k-y-36-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1727","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2019-12-12 Microsoft libera sus actualizaciones de diciembre que corrigen el Zero day Win32k y 36 Fallas"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2019-12-12 Microsoft libera sus actualizaciones de diciembre que corrigen el Zero day Win32k y 36 Fallas<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Diciembre 12, 2019<br>\n\u00daltima revisi\u00f3n: Diciembre 12, 2019<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2019-Dec<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nInternet Explorer<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nSQL Server<br>\nVisual Studio<br>\nSkype for Business<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nMicrosoft public\u00f3 las siguientes actualizaciones de seguridad correspondientes este mes.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV190026\">ADV190026<\/a><\/td><td>Microsoft Guidance for cleaning up orphaned keys generated on vulnerable TPMs and used for Windows Hello for Business<\/td><td>Unknown<\/td><\/tr><tr><td>End of Life Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1489\">CVE-2019-1489<\/a><\/td><td>Remote Desktop Protocol Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1465\">CVE-2019-1465<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1468\">CVE-2019-1468<\/a><\/td><td>Win32k Graphics Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1466\">CVE-2019-1466<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1467\">CVE-2019-1467<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1400\">CVE-2019-1400<\/a><\/td><td>Microsoft Access Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1464\">CVE-2019-1464<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1461\">CVE-2019-1461<\/a><\/td><td>Microsoft Word Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1462\">CVE-2019-1462<\/a><\/td><td>Microsoft PowerPoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1463\">CVE-2019-1463<\/a><\/td><td>Microsoft Access Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1485\">CVE-2019-1485<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1453\">CVE-2019-1453<\/a><\/td><td>Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1476\">CVE-2019-1476<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1477\">CVE-2019-1477<\/a><\/td><td>Windows Printer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1474\">CVE-2019-1474<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1478\">CVE-2019-1478<\/a><\/td><td>Windows COM Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1483\">CVE-2019-1483<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1488\">CVE-2019-1488<\/a><\/td><td>Microsoft Defender Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1487\">CVE-2019-1487<\/a><\/td><td>Microsoft Authentication Library for Android Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Servicing Stack Updates<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV990001\">ADV990001<\/a><\/td><td>Latest Servicing Stack Updates<\/td><td>Critical<\/td><\/tr><tr><td>Skype for Business<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1490\">CVE-2019-1490<\/a><\/td><td>Skype for Business Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1332\">CVE-2019-1332<\/a><\/td><td>Microsoft SQL Server Reporting Services XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1350\">CVE-2019-1350<\/a><\/td><td>Git for Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1349\">CVE-2019-1349<\/a><\/td><td>Git for Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1486\">CVE-2019-1486<\/a><\/td><td>Visual Studio Live Share Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1387\">CVE-2019-1387<\/a><\/td><td>Git for Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1354\">CVE-2019-1354<\/a><\/td><td>Git for Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1351\">CVE-2019-1351<\/a><\/td><td>Git for Visual Studio Tampering Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1352\">CVE-2019-1352<\/a><\/td><td>Git for Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1471\">CVE-2019-1471<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1470\">CVE-2019-1470<\/a><\/td><td>Windows Hyper-V Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1472\">CVE-2019-1472<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1458\">CVE-2019-1458<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1469\">CVE-2019-1469<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1480\">CVE-2019-1480<\/a><\/td><td>Windows Media Player Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1481\">CVE-2019-1481<\/a><\/td><td>Windows Media Player Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1484\">CVE-2019-1484<\/a><\/td><td>Windows OLE Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nActualizar utilizando Windows Update<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2019-12-12 Microsoft libera sus actualizaciones de diciembre que corrigen el Zero day Win32k y 36 Fallas Gravedad: Alta Fecha de publicaci\u00f3n: Diciembre 12, 2019 \u00daltima revisi\u00f3n: Diciembre 12, 2019 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2019-Dec Sistemas Afectados:&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,72,9,73,68],"class_list":["post-1727","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1727"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1727\/revisions"}],"predecessor-version":[{"id":3249,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1727\/revisions\/3249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}