{"id":1418,"date":"2016-01-14T13:02:00","date_gmt":"2016-01-14T12:02:00","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1418"},"modified":"2016-01-18T10:55:02","modified_gmt":"2016-01-18T09:55:02","slug":"parches-de-microsoft-enero-de-2016-2","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2016\/parches-de-microsoft-enero-de-2016-2\/","title":{"rendered":"Parches de Microsoft Enero de 2016"},"content":{"rendered":"<p align=\"left\">El segundo martes de Enero de 2016, Microsoft public\u00f3 9 nuevos boletines de seguridad, de los cuales 6 han sido catalogados como cr\u00edticos y 3 como importantes.<\/p>\n<p>Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a futuros ataques.<\/p>\n<p align=\"left\">Los 9 boletines del mes de Enero de 2016 son los siguientes:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-001 (Severidad:<span style=\"color: #ff0000;\"> Cr\u00edtica<\/span>)<\/strong><\/p>\n<p align=\"left\">Cumulative Security Update for Internet Explorer (3124903)<\/p>\n<p align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717999\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-002 (Severidad:<span style=\"color: #ff0000;\"> Cr\u00edtica<\/span>)<\/strong><\/p>\n<p align=\"left\">Cumulative Security Update for Microsoft Edge (3124904)<\/p>\n<p align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718002\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<br \/>\n<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-003 (Severidad:<span style=\"color: #ff0000;\"> Cr\u00edtica<\/span>)<\/strong><\/p>\n<p align=\"left\">Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3125540)<\/p>\n<p align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718004\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-004 (Severidad:<span style=\"color: #ff0000;\"> Cr\u00edtica<\/span>)<\/strong><\/p>\n<p align=\"left\">Security Update for Microsoft Office to Address Remote Code Execution (3124585)<\/p>\n<p align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717998\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-005 (Severidad:<span style=\"color: #ff0000;\"> Cr\u00edtica<\/span>)<\/strong><\/p>\n<p align=\"left\">Security Update for Windows Kernel-Mode Drivers to Address Remote Code Execution (3124584)<\/p>\n<p class=\"western\" align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718001\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-006 (Severidad:<span style=\"color: #ff0000;\"> Cr\u00edtica<\/span>)<\/strong><\/p>\n<p align=\"left\">Security Update for Silverlight to Address Remote Code Execution (3126036)<\/p>\n<p align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717994\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-007 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<\/strong><\/p>\n<p align=\"left\">Security Update for Microsoft Windows to Address Remote Code Execution (3124901)<\/p>\n<p align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718006\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-008 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<\/strong><\/p>\n<p align=\"left\">Security Update for Windows Kernel to Address Elevation of Privilege (3124605)<\/p>\n<p class=\"western\" align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718007\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<p align=\"left\"><strong>Bolet\u00edn de seguridad de Microsoft MS16-010 (Severidad: <span style=\"color: #ff9900;\">Importante<\/span>)<\/strong><\/p>\n<p align=\"left\">Security Update in Microsoft Exchange Server to Address Spoofing (3124557)<\/p>\n<p class=\"western\" align=\"left\"><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717997\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p align=\"left\">Recomendamos el uso de <a href=\"http:\/\/update.microsoft.com\/\" target=\"_blank\">Windows Update<\/a> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\">Puede acceder a Windows Update a trav\u00e9s de su navegador MS Internet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows Update.<\/p>\n<p>Nota: Para utilizar Windows Update, necesitar\u00e1 establecer una conexi\u00f3n a Internet.\u00a0<span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b><br \/>\nSATINFO<\/b><\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>, <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>SERVICIO DE ASISTENCIA T\u00c9CNICA\u00a0<\/b><\/span><\/span><b><span style=\"font-size: small;\"><span style=\"line-height: 19.5px;\">INFORM\u00c1TICA<\/span><\/span><span style=\"font-size: medium;\">\u00a0<\/span><\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>1<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>4<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b> de <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>Enero<\/b><\/span><\/span><b style=\"font-size: medium;\"> <\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>de 201<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>6<\/b><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Enero de 2016, Microsoft public\u00f3 9 nuevos boletines de seguridad, de los cuales 6 han sido catalogados como cr\u00edticos y 3 como importantes. Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos <a href='https:\/\/www.satinfo.es\/noticies\/2016\/parches-de-microsoft-enero-de-2016-2\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[822,891,892],"tags":[823,824,825,826,827,828,829,830,831,11],"class_list":["post-1418","post","type-post","status-publish","format-standard","hentry","category-822","category-otros","category-todos","tag-ms16-001","tag-ms16-002","tag-ms16-003","tag-ms16-004","tag-ms16-005","tag-ms16-006","tag-ms16-007","tag-ms16-008","tag-ms16-010","tag-parches-de-microsoft","category-822-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1418"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1418\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}