Microsoft ha rilasciato 13 bollettini di sicurezza relativi
a vulnerabilita’ presenti nei sistemi operativi Windows
e in altre applicazioni
MS13-067 Vulnerabilita’ in Microsoft SharePoint Server
MS13-068 Vulnerabilita’ in Microsoft Outlook
MS13-069 Aggiornamento cumulativo Internet Explorer
MS13-070 Vulnerabilita’ in OLE
MS13-071 Vulnerabilita’ nel file dei temi di Windows
MS13-072 Vulnerabilita’ in Microsoft Office
MS13-073 Vulnerabilita’ di Microsoft Excel
MS13-074 Vulnerabilita’ in Microsoft Access
MS13-075 Vulnerabilita’ in Microsoft Office IME (cinese)
MS13-076 Vulnerabilita’ nei driver in modalita’ kernel
MS13-077 Vulnerabilita’ nella Gestione controllo servizi di Windows
MS13-078 Vulnerabilita’ in FrontPage
MS13-079 Vulnerabilita’ in Active Directory
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione “Riferimenti”.
:: Software interessato
Microsoft Windows (Internet Explorer)
Microsoft Outlook
Microsoft Office
Microsoft SharePoint Server
Microsoft FrontPage
Microsoft Active Directory
:: Impatto
Esecuzione di codice in modalita’ remota
Acquisizione di privilegi piu’ elevati
Denial of Service
Rivelazione e intercettazione di dati sensibili
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza – Settembre 2013
http://technet.microsoft.com/
Bollettini Microsoft sulla sicurezza
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
http://technet.microsoft.com/
Microsoft Knowledge Base
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
http://support.microsoft.com/
Microsoft Update
http://windowsupdate.
https://www.update.microsoft.
http://support.microsoft.com/
ISC SANS
http://isc.sans.edu/diary.
Mitre CVE
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-
http://www.cve.mitre.org/cgi-