{"id":181,"date":"2011-04-14T11:24:43","date_gmt":"2011-04-14T09:24:43","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=181"},"modified":"2011-04-14T11:24:43","modified_gmt":"2011-04-14T09:24:43","slug":"parches-de-microsoft-abril-de-2011","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2011\/parches-de-microsoft-abril-de-2011\/","title":{"rendered":"Parches de Microsoft Abril de 2011"},"content":{"rendered":"<p>El segundo martes de Abril de 2011, Microsoft public\u00f3 17 nuevos boletines de seguridad de los cuales 9 han sido catalogado como \u201cCr\u00edtico\u201d y 8 como \u201cImportante\u201d.<\/p>\n<p>Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad, y de este modo evitar estar expuestos a futuros ataques.<\/p>\n<p>Los 17 boletines del mes de Abril de 2011 son los siguientes:<\/p>\n<p><strong> <\/strong><a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-018.mspx\"><\/a> <strong><strong> <\/strong><\/strong><\/p>\n<p><strong><strong> <\/strong><\/strong><\/p>\n<ul>\n<li><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-018 (Severidad: <span style=\"color: #ff0000;\">Cr\u00edtico<\/span>)<\/strong><br \/>\nActualizaci\u00f3n \tde seguridad acumulativa para Internet Explorer (2497640)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-018.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/p>\n<p><\/a> <strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-019<\/strong><\/strong><strong> <\/strong><strong>(Severidad: <\/strong><span style=\"color: #ff0000;\"><strong>Cr\u00edtico<\/strong><\/span><strong>)<\/strong><strong><br \/>\n<\/strong>Vulnerabilidades \ten el cliente SMB podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo \t(2511455)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-019.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-020<\/strong><\/strong><strong> <\/strong><strong>(Severidad: <\/strong><span style=\"color: #ff0000;\"><strong>Cr\u00edtico<\/strong><\/span><strong>)<\/strong><strong><br \/>\n<\/strong>Una \tvulnerabilidad en el servidor SMB podr\u00eda permitir la ejecuci\u00f3n \tremota de c\u00f3digo (2508429)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-020.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-021<\/strong><\/strong><strong> (Severidad:<\/strong><span style=\"color: #ff9900;\"><strong> <\/strong><strong>Importante<\/strong><\/span><strong>)<\/strong><strong><br \/>\n<\/strong>Vulnerabilidades \ten Microsoft Excel podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo \t(2489279)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-021.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-022<\/strong><\/strong><strong> (Severidad:<\/strong><span style=\"color: #ff9900;\"><strong> <\/strong><strong>Importante<\/strong><\/span><strong>)<\/strong><strong><br \/>\n<\/strong>Vulnerabilidades \ten Microsoft PowerPoint podr\u00edan permitir la ejecuci\u00f3n remota de \tc\u00f3digo (2489283)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-022.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-023<\/strong><\/strong><strong> (Severidad:<\/strong><span style=\"color: #ff9900;\"><strong> <\/strong><strong>Importante<\/strong><\/span>)<br \/>\nVulnerabilidades \ten Microsoft Office podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo \t(2489293)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-023.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/p>\n<p><\/a><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-024<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff9900;\"><strong>Importante<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en Editor de portadas de fax de Windows podr\u00eda \tpermitir la ejecuci\u00f3n remota de c\u00f3digo (2527308)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-024.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-025<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff9900;\"><strong>Importante<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en la biblioteca Microsoft Foundation Class (MFC) \tpodr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo (2500212)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-025.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/p>\n<p><\/a><strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-026<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff9900;\"><strong>Importante<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en MHTML podr\u00eda permitir la divulgaci\u00f3n de \tinformaci\u00f3n (2503658)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-026.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<br \/>\n<\/a><strong><strong><\/strong><\/strong><\/li>\n<li><strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-027<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff0000;\"><strong>Cr\u00edtico<\/strong><\/span>)<strong><br \/>\n<\/strong>Actualizaci\u00f3n \tde seguridad acumulativa de bits de interrupci\u00f3n de ActiveX \t(2508272)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-027.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li> <strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-028<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff0000;\"><strong>Cr\u00edtico<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en .NET Framework podr\u00eda permitir la ejecuci\u00f3n \tremota de c\u00f3digo (2484015)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-028.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li> <strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-029<\/strong><\/strong><strong> (Severidad:<\/strong><span style=\"color: #ff0000;\"><strong> <\/strong><strong>Cr\u00edtico<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en GDI+ podr\u00eda permitir la ejecuci\u00f3n remota de \tc\u00f3digo (2489979)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-029.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li> <strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-030<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff0000;\"><strong>Cr\u00edtico<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en la resoluci\u00f3n DNS podr\u00eda permitir la ejecuci\u00f3n \tremota de c\u00f3digo (2509553)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-030.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li> <strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-031<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff0000;\"><strong>Cr\u00edtico<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en los motores de scripting de VBScript y JScript \tpodr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo (2514666)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-031.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li> <strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-032<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff0000;\"><strong>Cr\u00edtico<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en el controlador de OpenType CFF (Compact Font \t Format) podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo \t(2507618)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-032.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li> <strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-033<\/strong><\/strong><strong> (Severidad: <\/strong><span style=\"color: #ff9900;\"><strong>Importante<\/strong><\/span>)<strong><br \/>\n<\/strong>Una \tvulnerabilidad en los convertidores de texto de WordPad podr\u00eda \tpermitir la ejecuci\u00f3n remota de c\u00f3digo (2485663)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-033.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><strong><strong><\/strong><\/strong><\/li>\n<li> <strong><strong>Bolet\u00edn \tde seguridad de Microsoft MS11-034<\/strong><\/strong><strong> (Severidad:<\/strong><span style=\"color: #ff9900;\"><strong> <\/strong><strong>Importante<\/strong><\/span>)<strong><br \/>\n<\/strong>Vulnerabilidades \ten los controladores en modo kernel de Windows podr\u00edan permitir la \televaci\u00f3n de privilegios (2506223)<br \/>\n<a href=\"http:\/\/www.microsoft.com\/spain\/technet\/security\/Bulletin\/ms11-034.mspx\">Bolet\u00edn \tT\u00e9cnico (IT Pro)<\/a><\/li>\n<\/ul>\n<p>Recomendamos el uso de <a href=\"http:\/\/www.windowsupdate.com\/\"><em>Windows Update<\/em><\/a> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<\/p>\n<p>Puede \tacceder a <em>Windows Update a tr<\/em>av\u00e9s de su navegador MS \tInternet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows \tUpdate.<strong><\/strong><\/p>\n<ul>\n<li><strong>Nota<\/strong><strong>:<\/strong> Para utilizar Windows Update, necesitar\u00e1 establecer una \tconexi\u00f3n a Internet. <a href=\"..\/..\/..\/..\/..\/..\/noticies\"><strong><\/strong><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\"><strong>SATINFO<\/strong><\/span><strong>, <\/strong><strong>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/strong><strong> 14 de Abril de 2011<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Abril de 2011, Microsoft public\u00f3 17 nuevos boletines de seguridad de los cuales 9 han sido catalogado como \u201cCr\u00edtico\u201d y 8 como \u201cImportante\u201d. Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad, y de este modo evitar estar expuestos <a href='https:\/\/www.satinfo.es\/noticies\/2011\/parches-de-microsoft-abril-de-2011\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[8,891,892],"tags":[32,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85],"class_list":["post-181","post","type-post","status-publish","format-standard","hentry","category-8","category-otros","category-todos","tag-microsoft","tag-ms11-018","tag-ms11-019","tag-ms11-020","tag-ms11-021","tag-ms11-023","tag-ms11-024","tag-ms11-025","tag-ms11-026","tag-ms11-027","tag-ms11-028","tag-ms11-029","tag-ms11-030","tag-ms11-031","tag-ms11-032","tag-ms11-033","tag-ms11-034","category-8-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=181"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/181\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}