{"id":2105,"date":"2020-05-20T15:31:32","date_gmt":"2020-05-20T20:31:32","guid":{"rendered":"https:\/\/cert.pa\/?p=2105"},"modified":"2020-05-20T15:31:47","modified_gmt":"2020-05-20T20:31:47","slug":"csirt-panama-aviso-2020-05-15-microsoft-reporte-mensual-de-actualizaciones-correspondiente-a-mayo-de-2020","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2105","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-05-15 Microsoft: Reporte mensual de actualizaciones correspondiente a mayo de 2020"},"content":{"rendered":"\n<p>Gravedad:Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br>\nFecha de publicaci\u00f3n: Mayo 15, 2020<br>\n\u00daltima revisi\u00f3n: Mayo 15, 2020<br>\nPortal: https:\/\/portal.msrc.microsoft.com\/en-us\/ <\/p>\n\n\n\n<p><strong>Sistemas Afectados:<\/strong><\/p>\n\n\n\n<p>Los sistemas afectados en\nMicrosoft, tenemos: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>.NET Core 2.1<\/li><li>.NET Core 3.1<\/li><li>.NET Core 5.0<\/li><li>3D Viewer<\/li><li>ASP.NET Core 3.1<\/li><li>ChakraCore<\/li><li>Internet Explorer 9, 11<\/li><li>Microsoft .NET Framework<ul><li>2.0 Service Pack 2<\/li><\/ul><ul><li>3.0 Service Pack 2<\/li><\/ul><ul><li>3.5<\/li><\/ul><ul><li>4.5<\/li><\/ul><ul><li>4.6<\/li><\/ul><ul><li>4.7<\/li><\/ul><ul><li>4.8<\/li><\/ul><\/li><li>Microsoft 365 Apps<ul><li>Enterprise for 32-bit Systems<\/li><\/ul><ul><li>Enterprise for 64-bit Systems<\/li><\/ul><\/li><li>Microsoft Dynamics<ul><li>On Premise 8.2<\/li><\/ul><ul><li>On Premise 9.0<\/li><\/ul><\/li><li>Microsoft Edge (EdgeHTML-based)<\/li><li>Microsoft Excel<ul><li>2010 Service Pack 2 (32-bit y 64-bit editions)<\/li><\/ul><ul><li>2013 RT Service Pack 1<\/li><\/ul><ul><li>2013 Service Pack 1 (32-bit y 64-bit editions)<\/li><\/ul><ul><li>2016 (32-bit y 64-bit editions)<\/li><\/ul><\/li><li>Microsoft Office<ul><li>2016 for Mac<\/li><\/ul><ul><li>2019 (32-bit y 64-bit editions)<\/li><\/ul><ul><li>2019 for Mac<\/li><\/ul><\/li><li>Microsoft SharePoint<ul><li>Enterprise Server 2013 Service Pack 1<\/li><\/ul><ul><li>Enterprise Server 2016<\/li><\/ul><ul><li>Foundation 2010 Service Pack 2<\/li><\/ul><ul><li>Foundation 2013 Service Pack 1<\/li><\/ul><ul><li>Server 2010 Service Pack 2<\/li><\/ul><ul><li>Server 2019<\/li><\/ul><\/li><li>Microsoft Visual Studio<ul><li>2017 version 15.9 (includes 15.1 \u2013 15.8)<\/li><\/ul><ul><li>2019 version 16.0<\/li><\/ul><ul><li>2019 version 16.4 (includes 16.0 \u2013 16.3)<\/li><\/ul><ul><li>2019 version 16.5<\/li><\/ul><\/li><li>Office 365 ProPlus (32-bit y 64-bit\neditions)<\/li><li>OpenSSL 1.1.1g<\/li><li>Paint 3D<\/li><li>Power BI Report Server<\/li><li>Visual Studio Code<\/li><li>Windows 10<ul><li>Version 1607, 1709, 1803, 1809, 1903, 1909, para 32\ny 64 bit<\/li><\/ul><\/li><li>Windows 7<ul><li>32-bit Systems Service Pack 1<\/li><\/ul><ul><li>x64-based Systems Service Pack 1<\/li><\/ul><\/li><li>Windows 8.1<ul><li>32-bit systems<\/li><\/ul><ul><li>x64-based systems<\/li><\/ul><\/li><li>Windows RT 8.1<\/li><li>Windows Server 2008<ul><li>32-bit Systems Service Pack 2<\/li><\/ul><ul><li>32-bit Systems Service Pack 2 (Server Core\ninstallation)<\/li><\/ul><ul><li>Itanium-Based Systems Service Pack 2<\/li><\/ul><ul><li>x64-based Systems Service Pack 2<\/li><\/ul><ul><li>x64-based Systems Service Pack 2 (Server Core\ninstallation)<\/li><\/ul><ul><li>R2 for Itanium-Based Systems Service Pack 1<\/li><\/ul><ul><li>R2 for x64-based Systems Service Pack 1<\/li><\/ul><ul><li>R2 for x64-based Systems Service Pack 1 (Server\nCore installation)<\/li><\/ul><\/li><li>Windows Server 2012<ul><li>2012<\/li><\/ul><ul><li>Server Core installation<\/li><\/ul><ul><li>R2 y R2 (Server Core installation)<\/li><\/ul><\/li><li>Windows Server 2016<ul><li>2016<\/li><\/ul><ul><li>Server Core installation<\/li><\/ul><\/li><li>Windows Server 2019<ul><li>2019<\/li><\/ul><ul><li>Server Core installation<\/li><\/ul><\/li><li>Windows Server<ul><li>version 1803 (Server Core Installation)<\/li><\/ul><ul><li>version 1903 (Server Core installation)<\/li><\/ul><ul><li>version 1909 (Server Core installation)<\/li><\/ul><\/li><\/ul>\n\n\n\n<p><strong>&nbsp;<\/strong><strong>I. Descripci\u00f3n<\/strong><br>\nReporte mensual de actualizaciones de Microsoft correspondiente a mayo de 2020,\nparchando 10 vulnerabilidades clasificadas como importantes para sus softwares.\n<\/p>\n\n\n\n<p>Adem\u00e1s se informa de 103 vulnerabilidades\nadicionales al reporte mensual, 2 de ellas clasificadas como bajas, 2 como\nmoderadas, 85 como importantes y 14 como muy importantes. El informe es\nacompa\u00f1ado con las respectivas medidas de mitigaci\u00f3n.<\/p>\n\n\n\n<p><strong>II. Impacto<\/strong><\/p>\n\n\n\n<p>Dependiendo de la vulnerabilidad informada por\nMicrosoft se pueden provocar denegaciones de servicio, elevaci\u00f3n de\nprivilegios, acceso a informaci\u00f3n confidencial, ejecuci\u00f3n de c\u00f3digo remoto o\nspoofing.<\/p>\n\n\n\n<p><strong>Informadas en el reporte mensual correspondiente al\nmes de mayo:<\/strong><\/p>\n\n\n\n<p>CVE-2020-0901 \/\nCVE-2020-1116 \/ CVE-2020-0963 \/ CVE-2020-1141 \/ CVE-2020-1072 \/ CVE-2020-1145 \/\nCVE-2020-1075 \/ CVE-2020-1173 \/ CVE-2020-1103 \/ CVE-2020-1179<\/p>\n\n\n\n<p><strong>Vulnerabilidades adicionales informadas:<\/strong><\/p>\n\n\n\n<p>ADV200004 \/ CVE-2020-1099\n\/ CVE-2020-1156 \/ ADV200007 \/ CVE-2020-1100 \/ CVE-2020-1157 \/ CVE-2020-1062 \/\nCVE-2020-1101 \/ CVE-2020-1158 \/ CVE-2020-1064 \/ CVE-2020-1104 \/ CVE-2020-1161 \/\nCVE-2020-1035 \/ CVE-2020-1105 \/ CVE-2020-1164 \/ CVE-2020-1058 \/ CVE-2020-1106 \/\nCVE-2020-1165 \/ CVE-2020-0909 \/ CVE-2020-1107 \/ CVE-2020-1166 \/ CVE-2020-1010 \/\nCVE-2020-1108 \/ CVE-2020-1171 \/ CVE-2020-1021 \/ CVE-2020-1109 \/ CVE-2020-1174 \/\nCVE-2020-1048 \/ CVE-2020-1110 \/ CVE-2020-1175 \/ CVE-2020-1051 \/ CVE-2020-1111 \/\nCVE-2020-1176 \/ CVE-2020-1054 \/ CVE-2020-1112 \/ CVE-2020-1184 \/ CVE-2020-1055 \/\nCVE-2020-1113 \/ CVE-2020-1185 \/ CVE-2020-1059 \/ CVE-2020-1114 \/ CVE-2020-1186 \/\nCVE-2020-1060 \/ CVE-2020-1118 \/ CVE-2020-1187 \/ CVE-2020-1061 \/ CVE-2020-1121 \/\nCVE-2020-1188 \/ CVE-2020-1063 \/ CVE-2020-1123 \/ CVE-2020-1189 \/ CVE-2020-1066 \/\nCVE-2020-1124 \/ CVE-2020-1190 \/ CVE-2020-1067 \/ CVE-2020-1125 \/ CVE-2020-1191 \/\nCVE-2020-1068 \/ CVE-2020-1131 \/ CVE-2020-1023 \/ CVE-2020-1070 \/ CVE-2020-1132 \/\nCVE-2020-1024 \/ CVE-2020-1071 \/ CVE-2020-1134 \/ CVE-2020-1028 \/CVE-2020-1076 \/\nCVE-2020-1135 \/ CVE-2020-1037 \/ CVE-2020-1077 \/ CVE-2020-1137 \/ CVE-2020-1056 \/\nCVE-2020-1078 \/ CVE-2020-1138&nbsp; \/\nCVE-2020-1065 \/ CVE-2020-1079 \/ CVE-2020-1139 \/ CVE-2020-1069 \/ CVE-2020-1081 \/\nCVE-2020-1140 \/ CVE-2020-1093 \/ CVE-2020-1082 \/ CVE-2020-1142 \/CVE-2020-1102 \/\nCVE-2020-1084 \/ CVE-2020-1143 \/ CVE-2020-1117 \/ CVE-2020-1086 \/ CVE-2020-1144 \/\nCVE-2020-1126 \/ CVE-2020-1087 \/ CVE-2020-1149 \/ CVE-2020-1136 \/ CVE-2020-1088 \/\nCVE-2020-1150 \/ CVE-2020-1153 \/ CVE-2020-1090 \/ CVE-2020-1151 \/ CVE-2020-1192 \/\nCVE-2020-1092 \/ CVE-2020-1154 \/ CVE-2020-1096 \/ CVE-2020-1155<\/p>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e\ninformaci\u00f3n<\/strong><\/p>\n\n\n\n<p>Actualizar seg\u00fan sea el sistema mediante su sitio\nweb oficial. <\/p>\n\n\n\n<p><strong>Fuentes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CSIRT Chile. 13 de mayo del 2020. Vulnerabilidades. Recopilado\n     en:&nbsp;https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00212-01\/<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0901<\/li><li>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0963<\/li><li>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1072<\/li><li>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1075<\/li><\/ul>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion\nGubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad:Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fecha de publicaci\u00f3n: Mayo 15, 2020 \u00daltima revisi\u00f3n: Mayo 15, 2020 Portal: https:\/\/portal.msrc.microsoft.com\/en-us\/ Sistemas Afectados: Los sistemas afectados en Microsoft, tenemos: .NET Core 2.1.NET Core 3.1.NET Core 5.03D ViewerASP.NET Core 3.1ChakraCoreInternet Explorer 9, 11Microsoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-2105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2105"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2105\/revisions"}],"predecessor-version":[{"id":2106,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2105\/revisions\/2106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}