{"id":3400,"date":"2023-06-15T10:36:51","date_gmt":"2023-06-15T15:36:51","guid":{"rendered":"https:\/\/cert.pa\/?p=3400"},"modified":"2023-06-15T10:36:51","modified_gmt":"2023-06-15T15:36:51","slug":"csirt-panama-aviso-2023-jun-15-actualizaciones-de-seguridad-de-microsoft-para-junio","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3400","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2023-jun-15 Actualizaciones de seguridad de Microsoft para Junio."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2023-jun-15 Actualizaciones de seguridad de Microsoft para Junio.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: junio 15, 2023<br>\u00daltima revisi\u00f3n: junio 14, 2023<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Jun<\/p>\n\n\n\n<p>Sistemas Afectados:<br>.NET and Visual Studio<br>.NET Core<br>.NET Framework<br>ASP .NET<br>Azure DevOps<br>Microsoft Dynamics<br>Microsoft Edge (Chromium-based)<br>Microsoft Exchange Server<br>Microsoft Office<br>Microsoft Office Excel<br>Microsoft Office OneNote<br>Microsoft Office Outlook<br>Microsoft Office SharePoint<br>Microsoft Power Apps<br>Microsoft Printer Drivers<br>Microsoft WDAC OLE DB provider for SQL<br>Microsoft Windows Codecs Library<br>NuGet Client<br>Remote Desktop Client<br>Role: DNS Server<br>SysInternals<br>Visual Studio<br>Visual Studio Code<br>Windows Authentication Methods<br>Windows Bus Filter Driver<br>Windows Cloud Files Mini Filter Driver<br>Windows Collaborative Translation Framework<br>Windows Container Manager Service<br>Windows CryptoAPI<br>Windows DHCP Server<br>Windows Filtering<br>Windows GDI<br>Windows Geolocation Service<br>Windows Group Policy<br>Windows Hello<br>Windows Hyper-V<br>Windows Installer<br>Windows iSCSI<br>Windows Kernel<br>Windows NTFS<br>Windows ODBC Driver<br>Windows OLE<br>Windows PGM<br>Windows Remote Procedure Call Runtime<br>Windows Resilient File System (ReFS)<br>Windows Server Service<br>Windows SMB<br>Windows TPM Device Driver<br>Windows Win32K<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de junio.<br>Este conjunto de actualizaciones remedia 73 CVEs.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24895\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24895<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33126\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33126<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24936\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24936<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33135\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33135<\/a><\/td><td>.NET and Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32032\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32032<\/a><\/td><td>.NET and Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32030\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32030<\/a><\/td><td>.NET and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33128\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33128<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24897\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24897<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>.NET Core<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29331\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29331<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29326\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29326<\/a><\/td><td>.NET Framework Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP .NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33141\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33141<\/a><\/td><td>Yet Another Reverse Proxy (YARP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21569\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-21569<\/a><\/td><td>Azure DevOps Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21565\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-21565<\/a><\/td><td>Azure DevOps Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24896\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24896<\/a><\/td><td>Dynamics 365 Finance Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2941\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2941<\/a><\/td><td>Chromium: CVE-2023-2941 Inappropriate implementation in Extensions API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33145\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33145<\/a><\/td><td>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2937\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2937<\/a><\/td><td>Chromium: CVE-2023-2937 Inappropriate implementation in Picture In Picture<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2936\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2936<\/a><\/td><td>Chromium: CVE-2023-2936 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2935\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2935<\/a><\/td><td>Chromium: CVE-2023-2935 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2940\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2940<\/a><\/td><td>Chromium: CVE-2023-2940 Inappropriate implementation in Downloads<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2939\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2939<\/a><\/td><td>Chromium: CVE-2023-2939 Insufficient data validation in Installer<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2938\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2938<\/a><\/td><td>Chromium: CVE-2023-2938 Inappropriate implementation in Picture In Picture<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2931\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2931<\/a><\/td><td>Chromium: CVE-2023-2931 Use after free in PDF<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2930\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2930<\/a><\/td><td>Chromium: CVE-2023-2930 Use after free in Extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2929\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2929<\/a><\/td><td>Chromium: CVE-2023-2929 Out of bounds write in Swiftshader<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2934\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2934<\/a><\/td><td>Chromium: CVE-2023-2934 Out of bounds memory access in Mojo<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2933\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2933<\/a><\/td><td>Chromium: CVE-2023-2933 Use after free in PDF<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2932\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2932<\/a><\/td><td>Chromium: CVE-2023-2932 Use after free in PDF<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-3079\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-3079<\/a><\/td><td>Chromium: CVE-2023-3079 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29345\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29345<\/a><\/td><td>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33143\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33143<\/a><\/td><td>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32031\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32031<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28310\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-28310<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33146\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33146<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33133\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33133<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32029\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32029<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33137\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33137<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office OneNote<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33140\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33140<\/a><\/td><td>Microsoft OneNote Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33131\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33131<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33142\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33142<\/a><\/td><td>Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33129\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33129<\/a><\/td><td>Microsoft SharePoint Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33130\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33130<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33132\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33132<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29357\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29357<\/a><\/td><td>Microsoft SharePoint Server Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Power Apps<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32024\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32024<\/a><\/td><td>Microsoft Power Apps Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Printer Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32017\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32017<\/a><\/td><td>Microsoft PostScript Printer Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29372\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29372<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29370\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29370<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29365\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29365<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>NuGet Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29337\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29337<\/a><\/td><td>NuGet Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29362\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29362<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29352\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29352<\/a><\/td><td>Windows Remote Desktop Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32020\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32020<\/a><\/td><td>Windows DNS Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SysInternals<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29353\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29353<\/a><\/td><td>Sysinternals Process Monitor for Windows Denial of Service Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29007\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29007<\/a><\/td><td>GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit`<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33139\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33139<\/a><\/td><td>Visual Studio Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-25652\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-25652<\/a><\/td><td>GitHub: CVE-2023-25652 &#8220;git apply &#8211;reject&#8221; partially-controlled arbitrary file write<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-25815\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-25815<\/a><\/td><td>GitHub: CVE-2023-25815 Git looks for localized messages in an unprivileged place<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-27911\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-27911<\/a><\/td><td>AutoDesk: CVE-2023-27911 Heap buffer overflow vulnerability in Autodesk\u00ae FBX\u00ae SDK 2020 or prior<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-27910\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-27910<\/a><\/td><td>AutoDesk: CVE-2023-27910 stack buffer overflow vulnerability in Autodesk\u00ae FBX\u00ae SDK 2020 or prior<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29011\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29011<\/a><\/td><td>GitHub: CVE-2023-29011 The config file of `connect.exe` is susceptible to malicious placing<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29012\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29012<\/a><\/td><td>GitHub: CVE-2023-29012 Git CMD erroneously executes `doskey.exe` in current directory, if it exists<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-27909\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-27909<\/a><\/td><td>AutoDesk: CVE-2023-27909 Out-Of-Bounds Write Vulnerability in Autodesk\u00ae FBX\u00ae SDK 2020 or prior<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-33144\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-33144<\/a><\/td><td>Visual Studio Code Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Authentication Methods<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29364\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29364<\/a><\/td><td>Windows Authentication Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bus Filter Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32010\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32010<\/a><\/td><td>Windows Bus Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29361\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29361<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Collaborative Translation Framework<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32009\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32009<\/a><\/td><td>Windows Collaborative Translation Framework Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Manager Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32012\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32012<\/a><\/td><td>Windows Container Manager Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CryptoAPI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24937\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24937<\/a><\/td><td>Windows CryptoAPI Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CryptoAPI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24938\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24938<\/a><\/td><td>Windows CryptoAPI Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29355\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29355<\/a><\/td><td>DHCP Server Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Filtering<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29368\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29368<\/a><\/td><td>Windows Filtering Platform Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows GDI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29358\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29358<\/a><\/td><td>Windows GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Geolocation Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29366\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29366<\/a><\/td><td>Windows Geolocation Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Group Policy<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29351\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29351<\/a><\/td><td>Windows Group Policy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32018\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32018<\/a><\/td><td>Windows Hello Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32013\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32013<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32016\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32016<\/a><\/td><td>Windows Installer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows iSCSI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32011\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32011<\/a><\/td><td>Windows iSCSI Discovery Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32019\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32019<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29346\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29346<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows ODBC Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29373\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29373<\/a><\/td><td>Microsoft ODBC Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29367\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29367<\/a><\/td><td>iSCSI Target WMI Provider Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PGM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29363\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29363<\/a><\/td><td>Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows PGM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32014\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32014<\/a><\/td><td>Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows PGM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32015\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32015<\/a><\/td><td>Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29369\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29369<\/a><\/td><td>Remote Procedure Call Runtime Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32008\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32008<\/a><\/td><td>Windows Resilient File System (ReFS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Server Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32022\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32022<\/a><\/td><td>Windows Server Service Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-32021\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32021<\/a><\/td><td>Windows SMB Witness Service Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TPM Device Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29360\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29360<\/a><\/td><td>Windows TPM Device Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29371\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29371<\/a><\/td><td>Windows GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29359\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29359<\/a><\/td><td>GDI Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2023-jun-15 Actualizaciones de seguridad de Microsoft para Junio.Gravedad: AltaFecha de publicaci\u00f3n: junio 15, 2023\u00daltima revisi\u00f3n: junio 14, 2023https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-Jun Sistemas Afectados:.NET and Visual Studio.NET Core.NET FrameworkASP .NETAzure DevOpsMicrosoft DynamicsMicrosoft Edge (Chromium-based)Microsoft Exchange ServerMicrosoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72],"class_list":["post-3400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3400"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3400\/revisions"}],"predecessor-version":[{"id":3401,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3400\/revisions\/3401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}