{"id":942,"date":"2014-05-16T09:58:14","date_gmt":"2014-05-16T07:58:14","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=942"},"modified":"2014-05-16T09:58:14","modified_gmt":"2014-05-16T07:58:14","slug":"parches-de-microsoft-mayo-de-2014","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2014\/parches-de-microsoft-mayo-de-2014\/","title":{"rendered":"Parches de Microsoft Mayo de 2014"},"content":{"rendered":"<p style=\"margin-right: 0.09cm; text-align: left;\" align=\"CENTER\"><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">El segundo martes de <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">Mayo<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">de 201<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">4<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">, Microsoft public\u00f3 <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">8<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\"> nuevos boletines de seguridad, <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">de los cuales <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">2<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\"> ha<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\"> sido catalogado<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">s<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\"> como <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">\u201c<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">Cr\u00edtic<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">o<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">\u201d <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">y <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">6<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\"> como \u201cImportante\u201d<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-weight: normal;\">.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-right: 0.09cm; font-weight: normal;\" align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a futuros ataques.<\/span><\/span><\/p>\n<p style=\"margin-right: 0.09cm;\" align=\"LEFT\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\">Los <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\">8<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\">boletines del mes de <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\">Mayo<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"> de 201<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\">4<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"> son los siguientes:<\/span><\/span><\/span><\/span><\/p>\n<p style=\"margin-right: 0.09cm;\" align=\"LEFT\"><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b><br \/>\n<\/b><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>22<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Vulnerabilidades en Microsoft SharePoint Server podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo <\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-022\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/span><\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>23<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Vulnerabilidades en Microsoft Office podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo<\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-023\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/span><\/a><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\">\n<\/li>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>24<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Una vulnerabilidad en un control com\u00fan de Microsoft podr\u00eda permitir la omisi\u00f3n de caracter\u00edstica de seguridad<\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-024\"><span style=\"font-size: small;\"><span style=\"font-weight: normal;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/span><\/a><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\">\n<\/li>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>2<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Una vulnerabilidad en las preferencias de directiva de grupo podr\u00eda permitir la elevaci\u00f3n de privilegios<\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-025\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a>\u00a0\u00a0<\/span><\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>2<\/b><\/span><span style=\"font-size: small;\"><b>6<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Una vulnerabilidad en .NET Framework podr\u00eda permitir la elevaci\u00f3n de privilegios<\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-026\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>2<\/b><\/span><span style=\"font-size: small;\"><b>7<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Una vulnerabilidad en el controlador del shell de Windows podr\u00eda permitir la elevaci\u00f3n<\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-027\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>2<\/b><\/span><span style=\"font-size: small;\"><b>8<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Vulnerabilidades en iSCSI podr\u00edan permitir la denegaci\u00f3n de servicio<\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-028\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>2<\/b><\/span><span style=\"font-size: small;\"><b>9<\/b><\/span><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm; font-weight: normal;\" align=\"LEFT\"><span style=\"font-size: small;\">Actualizaci\u00f3n de seguridad para Internet Explorer<\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms14-029\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/strong><\/span><\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><span style=\"font-weight: normal;\"><br \/>\n<\/span><\/span><\/strong><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\">Recomendamos el uso de <\/span><a href=\"http:\/\/update.microsoft.com\/\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><i><span style=\"text-decoration: underline;\">Windows Update<\/span><\/i><\/span><\/span><\/a><span style=\"font-size: small;\"> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<br \/>\n<\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Puede acceder a <i>Windows Update a tr<\/i>av\u00e9s de su navegador MS Internet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows Update.<\/span><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><b>Nota<\/b><\/span><b>:<\/b>Para utilizar Windows Update, necesitar\u00e1 establecer una conexi\u00f3n a Internet.<\/p>\n<p class=\"western\" style=\"margin-top: 0cm; margin-bottom: 0cm;\" align=\"LEFT\">\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"LEFT\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>SATINFO<\/b><\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>, <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>1<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>5<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b> de <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>Mayo <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>de 201<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>4<\/b><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Mayode 2014, Microsoft public\u00f3 8 nuevos boletines de seguridad, de los cuales 2 han sido catalogados como \u201cCr\u00edtico\u201d y 6 como \u201cImportante\u201d. &nbsp; Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos <a href='https:\/\/www.satinfo.es\/noticies\/2014\/parches-de-microsoft-mayo-de-2014\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[517,891,892],"tags":[31,32,554,555,556,557,558,559,560,561,135],"class_list":["post-942","post","type-post","status-publish","format-standard","hentry","category-517","category-otros","category-todos","tag-boletines-de-seguridad","tag-microsoft","tag-ms14-022","tag-ms14-023","tag-ms14-024","tag-ms14-025","tag-ms14-026","tag-ms14-027","tag-ms14-028","tag-ms14-029","tag-vulnerabilidades","category-517-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=942"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/942\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}