{"id":494,"date":"2012-10-11T08:55:23","date_gmt":"2012-10-11T06:55:23","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=494"},"modified":"2012-10-11T08:55:23","modified_gmt":"2012-10-11T06:55:23","slug":"parches-de-microsoft-octubre-de-2012","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2012\/parches-de-microsoft-octubre-de-2012\/","title":{"rendered":"Parches de Microsoft Octubre de 2012"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"CENTER\"><span style=\"color: #000000;\">El segundo martes de Octubre de 2012, Microsoft public\u00f3 7 nuevos boletines de seguridad de los cuales 1 ha sido catalogado como \u201cCr\u00edtico\u201d y 6 como \u201cImportante\u201d.<\/span><\/p>\n<p align=\"LEFT\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\"><br \/>\n<\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a futuros ataques.<\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><\/p>\n<p>Los 7 boletines del mes de Octubre de 2012 son los siguientes:<br \/>\n<\/span><\/span><strong><span style=\"font-size: small;\"><br \/>\n<\/span> <\/strong><\/span><\/p>\n<ul>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><strong>Bolet\u00edn de seguridad de Microsoft MS12-064 (Severidad: <\/strong><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><strong>Cr\u00edtico<\/strong><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><strong>)<\/strong><\/span><\/strong><strong><span style=\"font-size: small;\"><br \/>\nVulnerabilidades en Microsoft Word podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo<br \/>\n<\/span><\/strong><span style=\"font-size: small;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms12-064\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><strong>Bolet\u00edn de seguridad de Microsoft MS12-065<\/strong><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><strong> (Severidad: <\/strong><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><strong>Importante<\/strong><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><strong>)<\/strong><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\nUna vulnerabilidad en Microsoft Works podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo<br \/>\n<\/span><\/span><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms12-065\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/span><\/a><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><strong>Bolet\u00edn de seguridad de Microsoft MS12-066<\/strong><\/span><strong><span style=\"font-size: small;\"><strong> (Severidad: <\/strong><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><strong>Importante<\/strong><\/span><\/span><span style=\"font-size: small;\"><strong>)<\/strong><\/span><span style=\"font-size: small;\"><br \/>\nUna vulnerabilidad en el componente de saneamiento de HTML podr\u00eda permitir la elevaci\u00f3n de privilegios<br \/>\n<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms12-066\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><strong>Bolet\u00edn de seguridad de Microsoft MS12-067<\/strong><\/span><strong><span style=\"font-size: small;\"><strong> (Severidad: <\/strong><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><strong>Importante<\/strong><\/span><\/span><span style=\"font-size: small;\"><strong>)<\/strong><\/span><span style=\"font-size: small;\"><br \/>\nVulnerabilidades en el an\u00e1lisis de FAST Search Server 2010 for SharePoint podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo<br \/>\n<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms12-067\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\">B<\/span><span style=\"font-size: small;\"><strong>olet\u00edn de seguridad de Microsoft MS12-068<\/strong><\/span><strong><span style=\"font-size: small;\"><strong> (Severidad: <\/strong><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><strong>Importante<\/strong><\/span><\/span><span style=\"font-size: small;\"><strong>)<\/strong><\/span><span style=\"font-size: small;\"><br \/>\nUna vulnerabilidad en el kernel de Windows podr\u00eda permitir la elevaci\u00f3n de privilegios<br \/>\n<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms12-068\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><strong>Bolet\u00edn de seguridad de Microsoft MS12-069<\/strong><\/span><strong><span style=\"font-size: small;\"><strong> (Severidad: <\/strong><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><strong>Importante<\/strong><\/span><\/span><span style=\"font-size: small;\"><strong>)<\/strong><\/span><span style=\"font-size: small;\"><br \/>\nUna vulnerabilidad en Kerberos podr\u00eda permitir la denegaci\u00f3n de servicio<br \/>\n<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms12-069\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><strong>Bolet\u00edn de seguridad de Microsoft MS12-070<\/strong><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><strong> (Severidad: <\/strong><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><strong>Importante<\/strong><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><strong>)<\/strong><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\nUna vulnerabilidad en SQL Server podr\u00eda permitir la elevaci\u00f3n de privilegios<br \/>\n<\/span><\/span><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms12-070\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/span><\/a><span style=\"color: #000000;\"><span style=\"font-size: small;\"><\/p>\n<p><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"LEFT\">\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\">Recomendamos el uso de <\/span><a href=\"http:\/\/update.microsoft.com\/\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><em><span style=\"text-decoration: underline;\">Windows Update<\/span><\/em><\/span><\/span><\/a><span style=\"font-size: small;\"> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<br \/>\n<\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Puede acceder a <em>Windows Update a tr<\/em>av\u00e9s de su navegador MS Internet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows Update.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Nota<\/strong><\/span><strong>:<\/strong>Para utilizar Windows Update, necesitar\u00e1 establecer una conexi\u00f3n a Internet.<br \/>\n<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"LEFT\">\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><strong>SATINFO<\/strong><\/span><\/span><span style=\"font-size: small;\"><strong>, <\/strong><\/span><span style=\"font-size: small;\"><strong>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/strong><\/span><span style=\"font-size: small;\"><strong> 11 de Octubre de 2012<\/strong><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Octubre de 2012, Microsoft public\u00f3 7 nuevos boletines de seguridad de los cuales 1 ha sido catalogado como \u201cCr\u00edtico\u201d y 6 como \u201cImportante\u201d. Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos <a href='https:\/\/www.satinfo.es\/noticies\/2012\/parches-de-microsoft-octubre-de-2012\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[188,891,892],"tags":[32,285,286,287,288,289,290,291,271],"class_list":["post-494","post","type-post","status-publish","format-standard","hentry","category-188","category-otros","category-todos","tag-microsoft","tag-ms12-064","tag-ms12-065","tag-ms12-066","tag-ms12-067","tag-ms12-068","tag-ms12-069","tag-ms12-070","tag-vulnerabilidad","category-188-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=494"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/494\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}