{"id":846,"date":"2014-02-13T11:07:08","date_gmt":"2014-02-13T10:07:08","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=846"},"modified":"2014-02-13T11:08:52","modified_gmt":"2014-02-13T10:08:52","slug":"parches-de-microsoft-febrero-de-2014","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2014\/parches-de-microsoft-febrero-de-2014\/","title":{"rendered":"Parches de Microsoft Febrero de 2014"},"content":{"rendered":"<p align=\"CENTER\"><span style=\"color: #000000;\">El segundo martes de <\/span><span style=\"color: #000000;\">Febrero<\/span><span style=\"color: #000000;\">de 201<\/span><span style=\"color: #000000;\">4<\/span><span style=\"color: #000000;\">, Microsoft public\u00f3 <\/span><span style=\"color: #000000;\">7<\/span><span style=\"color: #000000;\"> nuevos boletines de seguridad, <\/span><span style=\"color: #000000;\">de los cuales 4<\/span><span style=\"color: #000000;\"> ha<\/span><span style=\"color: #000000;\">n<\/span><span style=\"color: #000000;\"> sido catalogado<\/span><span style=\"color: #000000;\">s<\/span><span style=\"color: #000000;\"> como <\/span><span style=\"color: #000000;\">\u201c<\/span><span style=\"color: #000000;\">Cr\u00edtica<\/span><span style=\"color: #000000;\">\u201d <\/span><span style=\"color: #000000;\">y 3 como \u201cImportante\u201d<\/span><span style=\"color: #000000;\">.<\/span><\/p>\n<p align=\"LEFT\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\"><span style=\"line-height: 1.5em;\">Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a futuros ataques.<\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"color: #000000;\">Los <\/span><span style=\"color: #000000;\">7<\/span><span style=\"color: #000000;\">boletines del mes de <\/span><span style=\"color: #000000;\">Febrero<\/span><span style=\"color: #000000;\"> de 201<\/span><span style=\"color: #000000;\">4<\/span><span style=\"color: #000000;\"> son los siguientes:<\/span><\/p>\n<ul>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span><b>4<\/b><\/span><span><b>-0<\/b><\/span><span><b>0<\/b><\/span><span><b>5<\/b><\/span><strong><span><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span><b>Importante<\/b><\/span><\/span><\/strong><strong><span><b>)<br \/>\n<\/b><\/span><\/strong><\/span>Una vulnerabilidad en Microsoft XML Core Services podr\u00eda permitir la divulgaci\u00f3n de informaci\u00f3n (2916036)<br \/>\n<span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-005\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/strong><\/span><\/p>\n<p align=\"LEFT\"><span style=\"line-height: 1.5em;\">\u00a0<\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span><b>4<\/b><\/span><span><b>-0<\/b><\/span><span><b>0<\/b><\/span><span><b>6<\/b><\/span><strong><span><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span><b>Importante<\/b><\/span><\/span><\/strong><strong><span><b>)<br \/>\n<\/b><\/span><\/strong><\/span>Una vulnerabilidad en IPv6 podr\u00eda permitir la denegaci\u00f3n de servicio (2904659)<br \/>\n<span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-006\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/strong><\/span><\/p>\n<p align=\"LEFT\"><span style=\"line-height: 1.5em;\">\u00a0<\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span><b>4<\/b><\/span><span><b>-0<\/b><\/span><span><b>0<\/b><\/span><span><b>7<\/b><\/span><strong><span><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span><b>)<br \/>\n<\/b><\/span><\/strong><\/span>Una vulnerabilidad en Direct2D podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo (2912390)<br \/>\n<span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-007\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/strong><\/span><\/p>\n<p align=\"LEFT\"><span style=\"line-height: 1.5em;\">\u00a0<\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span><b>4<\/b><\/span><span><b>-0<\/b><\/span><span><b>0<\/b><\/span><span><b>8<\/b><\/span><strong><span><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span><b>)<br \/>\n<\/b><\/span><\/strong><\/span>Una vulnerabilidad en Microsoft Forefront Protection para Exchange podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo (2927022)<br \/>\n<span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-008\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/strong><\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span>\u00a0<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span><b>4<\/b><\/span><span><b>-0<\/b><\/span><span><b>0<\/b><\/span><span><b>9<\/b><\/span><strong><span><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span><b>Importante<\/b><\/span><\/span><\/strong><strong><span><b>)<br \/>\n<\/b><\/span><\/strong><\/span>Vulnerabilidades en .NET Framework podr\u00edan permitir la elevaci\u00f3n de privilegios (2916607)<br \/>\n<span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-009\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/strong><\/span><\/p>\n<p align=\"LEFT\"><span style=\"line-height: 1.5em;\">\u00a0<\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span><b>4<\/b><\/span><span><b>-0<\/b><\/span><span><b>10<\/b><\/span><strong><span><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span><b>)<br \/>\n<\/b><\/span><\/strong><\/span>Actualizaci\u00f3n de seguridad acumulativa para Internet Explorer (2909921)<br \/>\n<span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-010\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/strong><\/span><\/p>\n<p align=\"LEFT\"><span style=\"line-height: 1.5em;\">\u00a0<\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span><b>4<\/b><\/span><span><b>-011<\/b><\/span><strong><span><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span><b>)<br \/>\n<\/b><\/span><\/strong><\/span>Una vulnerabilidad en el motor de scripting de VBScript podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo (2928390)<br \/>\n<span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-011\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/strong><\/span><\/p>\n<p align=\"LEFT\">\n<\/li>\n<\/ul>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span>Recomendamos el uso de <\/span><a href=\"http:\/\/update.microsoft.com\/\"><span style=\"color: #0000ff;\"><span><i><span style=\"text-decoration: underline;\">Windows Update<\/span><\/i><\/span><\/span><\/a><span> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<br \/>\n<\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span>Puede acceder a <i>Windows Update a tr<\/i>av\u00e9s de su navegador MS Internet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows Update.<\/span><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><b>Nota<\/b><\/span><b>:<\/b>Para utilizar Windows Update, necesitar\u00e1 establecer una conexi\u00f3n a Internet.<\/p>\n<p align=\"LEFT\">\n<\/li>\n<\/ul>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #0000ff;\"><span><b><br \/>\nSATINFO<\/b><\/span><\/span><span><b>, <\/b><\/span><span><b>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA\u00a0<\/b><\/span><span><b>13<\/b><\/span><span><b> de <\/b><\/span><span><b>Febrero\u00a0<\/b><\/span><span><b>de 201<\/b><\/span><span><b>4<\/b><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Febrerode 2014, Microsoft public\u00f3 7 nuevos boletines de seguridad, de los cuales 4 han sido catalogados como \u201cCr\u00edtica\u201d y 3 como \u201cImportante\u201d. Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a <a href='https:\/\/www.satinfo.es\/noticies\/2014\/parches-de-microsoft-febrero-de-2014\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[517,891,892],"tags":[32,522,523,524,525,526,527,528,158,271],"class_list":["post-846","post","type-post","status-publish","format-standard","hentry","category-517","category-otros","category-todos","tag-microsoft","tag-ms14-005","tag-ms14-006","tag-ms14-007","tag-ms14-008","tag-ms14-009","tag-ms14-010","tag-ms14-011","tag-parches","tag-vulnerabilidad","category-517-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=846"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/846\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}