{"id":1292,"date":"2015-07-20T09:59:18","date_gmt":"2015-07-20T07:59:18","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1292"},"modified":"2015-07-20T09:59:18","modified_gmt":"2015-07-20T07:59:18","slug":"parches-de-microsoft-julio-de-2015","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2015\/parches-de-microsoft-julio-de-2015\/","title":{"rendered":"Parches de Microsoft Julio de 2015"},"content":{"rendered":"<p align=\"left\">El segundo martes de Julio de 2015, Microsoft public\u00f3 14 nuevos boletines de seguridad, de los cuales 4 han sido catalogado como \u201cCr\u00edtico\u201d y 10 como \u201cImportante\u201d.<\/p>\n<p>Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a futuros ataques.<\/p>\n<p>Los 14 boletines del mes de Julio de 2015 son los siguientes:<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-058 (Severidad:<span style=\"color: #ff0000;\"> <span style=\"color: #ff9900;\">Importante<\/span><\/span>)<br \/>\n<\/strong>Vulnerabilities in SQL Server Could Allow Remote Code Execution<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-058\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-065 (Severidad: <span style=\"color: #ff0000;\">Cr\u00edtica<\/span>)<br \/>\n<\/strong>Security Update for Internet Explorer<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-065\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-066 (Severidad: <span style=\"color: #ff0000;\">Cr\u00edtica<\/span>)<br \/>\n<\/strong>Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-066\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-067 (Severidad: <span style=\"color: #ff0000;\">Cr\u00edtica<\/span>)<br \/>\n<\/strong>Vulnerability in RDP Could Allow Remote Code Execution<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-067\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-068 (Severidad: <span style=\"color: #ff0000;\">Cr\u00edtica<\/span>)<br \/>\n<\/strong>Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-068\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-069 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerabilities in Windows Could Allow Remote Code Execution<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-069\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-070 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerabilities in Microsoft Office Could Allow Remote Code Execution<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-070\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-071\u00a0(Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerability in Netlogon Could Allow Elevation of Privilege<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-071\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-072 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-072\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-073 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-073\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-074 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerability in Windows Installer Service Could Allow Elevation of Privilege<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-074\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-075 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerabilities in OLE Could Allow Elevation of Privilege<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-075\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-076 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-076\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS15-077 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<br \/>\n<\/strong>Vulnerability in ATM Font Driver Could Allow Elevation of Privilege<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-077\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p align=\"left\">Recomendamos el uso de <em><a href=\"http:\/\/update.microsoft.com\/\" target=\"_blank\">Windows Update<\/a><\/em> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<\/p>\n<ul>\n<li>\n<p align=\"left\">Puede acceder a <em>Windows Update<\/em> a trav\u00e9s de su navegador MS Internet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows Update.<\/p>\n<p><strong>Nota:<\/strong> Para utilizar Windows Update, necesitar\u00e1 establecer una conexi\u00f3n a Internet.<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b><br \/>\nSATINFO<\/b><\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>, <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/b><\/span><\/span><b> <\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>20<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>\u00a0de <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>Julio<\/b><\/span><\/span><b> <\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>de 201<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>5<\/b><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Julio de 2015, Microsoft public\u00f3 14 nuevos boletines de seguridad, de los cuales 4 han sido catalogado como \u201cCr\u00edtico\u201d y 10 como \u201cImportante\u201d. Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos <a href='https:\/\/www.satinfo.es\/noticies\/2015\/parches-de-microsoft-julio-de-2015\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[655,891,892],"tags":[31,32,768,767,766,765,764,763,762,761,760,759,758,757,756,755],"class_list":["post-1292","post","type-post","status-publish","format-standard","hentry","category-655","category-otros","category-todos","tag-boletines-de-seguridad","tag-microsoft","tag-ms15-058","tag-ms15-065","tag-ms15-066","tag-ms15-067","tag-ms15-068","tag-ms15-069","tag-ms15-070","tag-ms15-071","tag-ms15-072","tag-ms15-073","tag-ms15-074","tag-ms15-075","tag-ms15-076","tag-ms15-077","category-655-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1292"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1292\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}