Alert GCSA-23021 - Microsoft Monthly Security Update - febbraio 2023


******************************************************************

Alert ID: GCSA-23021
data: 15 febbraio 2023
titolo: Microsoft Monthly Security Update - febbraio 2023

******************************************************************

:: Descrizione del problema

Microsoft ha pubblicato il security update per il mese di febbraio 2023,
con questa release vengono risolte 77 vulnerabilita', 9 delle quali
classificate come critiche.

Microsoft ha confermato che le tre seguenti vulnerabilita' sono in corso di sfruttamento

Windows Graphics Component Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823

Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376

Microsoft Publisher Security Features Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21715

Maggiori dettagli sono disponibili alla sezione "Riferimenti".


:: Software / Tecnologie interessate

Windows
Extended Security Updates (ESU)
Microsoft Office
Microsoft Edge (Chromium-based)
Microsoft Defender - System Center
Microsoft Azure products
Microsoft Dynamics 365
Microsoft SQL Server
Microsoft Exchange Server
Microsoft Developer Tools
Microsoft Device - HoloLens
3D Builder


:: Impatto

Esecuzione remota di codice arbitrario (RCE)
Acquisizione di privilegi piu' elevati (EoP)
Denial of Service (DoS)
Rivelazione di informazioni (ID)
Bypass delle funzionalita' di sicurezza (SFB)
Provide Misleading Information (spoofing)
Manomissione (Data Manipulation)


:: Soluzioni

In Windows per default gli aggiornamenti
avvengono in maniera automatica.

Per verificare manualmente la disponibilita' di aggiornamenti scegliere
Start > Impostazioni > Aggiornamento e Sicurezza > Windows Update

Verificare di aver installato la versione piu' recente del

Servicing Stack Updates
https://msrc.microsoft.com/update-guide/vulnerability/ADV990001
https://docs.microsoft.com/it-it/windows/deployment/update/servicing-stack-updates

MSRC Security Update Guide
https://msrc.microsoft.com/update-guide/deployments

Windows Update domande frequenti
https://support.microsoft.com/en-us/help/12373/windows-update-faq

Gli aggiornamenti sono disponibili anche tramite WSUS ed il
catalogo di Microsoft Update
https://www.catalog.update.microsoft.com/


:: Riferimenti

Microsoft Security Updates - Release Notes
https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb
https://msrc.microsoft.com/update-guide/

Microsoft Security Update Guidance
https://portal.msrc.microsoft.com/en-us/security-guidance

Microsoft The Exchange Team
Released: February 2023 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-february-2023-exchange-server-security-updates/ba-p/3741058

Microsoft The Exchange Team
Exchange Server 2013 End of Support Approaching Fast
https://techcommunity.microsoft.com/t5/exchange-team-blog/exchange-server-2013-end-of-support-approaching-fast/ba-p/3741491

Microsoft: Exchange Server 2013 reaches end of support in April
https://www.bleepingcomputer.com/news/security/microsoft-exchange-server-2013-reaches-end-of-support-in-april/

BleepingComputer.com
https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2023-patch-tuesday-fixes-3-exploited-zero-days-77-flaws/
https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5022834-and-kb5022840-updates-released/
https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5022845-and-kb5022836-cumulative-updates-released/

SANS Internet Storm Center
https://isc.sans.edu/diary/Microsoft%20February%202023%20Patch%20Tuesday/29548

Krebs on Security
https://krebsonsecurity.com/2023/02/microsoft-patch-tuesday-february-2023-edition/

Mitre CVE
I riferimenti CVE sono disponibili nell'advisory originale.


GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----

iGsEAREIACsWIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCY+z6+w0cY2VydEBnYXJy
Lml0AAoJEMGcTJNlEmBC+gQAmgP5O6MWh+FaXdweB1jhghxgWskwAKCoGlNCIj8r
4vRMrPOAW437wSeG4Q==
=Wpel
-----END PGP SIGNATURE-----