Alert GCSA-23021 - Microsoft Monthly Security Update - febbraio 2023
******************************************************************
Alert ID: GCSA-23021
data: 15 febbraio 2023
titolo: Microsoft Monthly Security Update - febbraio 2023
******************************************************************
:: Descrizione del problema
Microsoft ha pubblicato il security update per il mese di febbraio 2023,
con questa release vengono risolte 77 vulnerabilita', 9 delle quali
classificate come critiche.
Microsoft ha confermato che le tre seguenti vulnerabilita' sono in corso di sfruttamento
Windows Graphics Component Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376
Microsoft Publisher Security Features Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21715
Maggiori dettagli sono disponibili alla sezione "Riferimenti".
:: Software / Tecnologie interessate
Windows
Extended Security Updates (ESU)
Microsoft Office
Microsoft Edge (Chromium-based)
Microsoft Defender - System Center
Microsoft Azure products
Microsoft Dynamics 365
Microsoft SQL Server
Microsoft Exchange Server
Microsoft Developer Tools
Microsoft Device - HoloLens
3D Builder
:: Impatto
Esecuzione remota di codice arbitrario (RCE)
Acquisizione di privilegi piu' elevati (EoP)
Denial of Service (DoS)
Rivelazione di informazioni (ID)
Bypass delle funzionalita' di sicurezza (SFB)
Provide Misleading Information (spoofing)
Manomissione (Data Manipulation)
:: Soluzioni
In Windows per default gli aggiornamenti
avvengono in maniera automatica.
Per verificare manualmente la disponibilita' di aggiornamenti scegliere
Start > Impostazioni > Aggiornamento e Sicurezza > Windows Update
Verificare di aver installato la versione piu' recente del
Servicing Stack Updates
https://msrc.microsoft.com/update-guide/vulnerability/ADV990001
https://docs.microsoft.com/it-it/windows/deployment/update/servicing-stack-updates
MSRC Security Update Guide
https://msrc.microsoft.com/update-guide/deployments
Windows Update domande frequenti
https://support.microsoft.com/en-us/help/12373/windows-update-faq
Gli aggiornamenti sono disponibili anche tramite WSUS ed il
catalogo di Microsoft Update
https://www.catalog.update.microsoft.com/
:: Riferimenti
Microsoft Security Updates - Release Notes
https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb
https://msrc.microsoft.com/update-guide/
Microsoft Security Update Guidance
https://portal.msrc.microsoft.com/en-us/security-guidance
Microsoft The Exchange Team
Released: February 2023 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-february-2023-exchange-server-security-updates/ba-p/3741058
Microsoft The Exchange Team
Exchange Server 2013 End of Support Approaching Fast
https://techcommunity.microsoft.com/t5/exchange-team-blog/exchange-server-2013-end-of-support-approaching-fast/ba-p/3741491
Microsoft: Exchange Server 2013 reaches end of support in April
https://www.bleepingcomputer.com/news/security/microsoft-exchange-server-2013-reaches-end-of-support-in-april/
BleepingComputer.com
https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2023-patch-tuesday-fixes-3-exploited-zero-days-77-flaws/
https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5022834-and-kb5022840-updates-released/
https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5022845-and-kb5022836-cumulative-updates-released/
SANS Internet Storm Center
https://isc.sans.edu/diary/Microsoft%20February%202023%20Patch%20Tuesday/29548
Krebs on Security
https://krebsonsecurity.com/2023/02/microsoft-patch-tuesday-february-2023-edition/
Mitre CVE
I riferimenti CVE sono disponibili nell'advisory originale.
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iGsEAREIACsWIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCY+z6+w0cY2VydEBnYXJy
Lml0AAoJEMGcTJNlEmBC+gQAmgP5O6MWh+FaXdweB1jhghxgWskwAKCoGlNCIj8r
4vRMrPOAW437wSeG4Q==
=Wpel
-----END PGP SIGNATURE-----
Alert ID: GCSA-23021
data: 15 febbraio 2023
titolo: Microsoft Monthly Security Update - febbraio 2023
******************************************************************
:: Descrizione del problema
Microsoft ha pubblicato il security update per il mese di febbraio 2023,
con questa release vengono risolte 77 vulnerabilita', 9 delle quali
classificate come critiche.
Microsoft ha confermato che le tre seguenti vulnerabilita' sono in corso di sfruttamento
Windows Graphics Component Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376
Microsoft Publisher Security Features Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21715
Maggiori dettagli sono disponibili alla sezione "Riferimenti".
:: Software / Tecnologie interessate
Windows
Extended Security Updates (ESU)
Microsoft Office
Microsoft Edge (Chromium-based)
Microsoft Defender - System Center
Microsoft Azure products
Microsoft Dynamics 365
Microsoft SQL Server
Microsoft Exchange Server
Microsoft Developer Tools
Microsoft Device - HoloLens
3D Builder
:: Impatto
Esecuzione remota di codice arbitrario (RCE)
Acquisizione di privilegi piu' elevati (EoP)
Denial of Service (DoS)
Rivelazione di informazioni (ID)
Bypass delle funzionalita' di sicurezza (SFB)
Provide Misleading Information (spoofing)
Manomissione (Data Manipulation)
:: Soluzioni
In Windows per default gli aggiornamenti
avvengono in maniera automatica.
Per verificare manualmente la disponibilita' di aggiornamenti scegliere
Start > Impostazioni > Aggiornamento e Sicurezza > Windows Update
Verificare di aver installato la versione piu' recente del
Servicing Stack Updates
https://msrc.microsoft.com/update-guide/vulnerability/ADV990001
https://docs.microsoft.com/it-it/windows/deployment/update/servicing-stack-updates
MSRC Security Update Guide
https://msrc.microsoft.com/update-guide/deployments
Windows Update domande frequenti
https://support.microsoft.com/en-us/help/12373/windows-update-faq
Gli aggiornamenti sono disponibili anche tramite WSUS ed il
catalogo di Microsoft Update
https://www.catalog.update.microsoft.com/
:: Riferimenti
Microsoft Security Updates - Release Notes
https://msrc.microsoft.com/update-guide/releaseNote/2023-Feb
https://msrc.microsoft.com/update-guide/
Microsoft Security Update Guidance
https://portal.msrc.microsoft.com/en-us/security-guidance
Microsoft The Exchange Team
Released: February 2023 Exchange Server Security Updates
https://techcommunity.microsoft.com/t5/exchange-team-blog/released-february-2023-exchange-server-security-updates/ba-p/3741058
Microsoft The Exchange Team
Exchange Server 2013 End of Support Approaching Fast
https://techcommunity.microsoft.com/t5/exchange-team-blog/exchange-server-2013-end-of-support-approaching-fast/ba-p/3741491
Microsoft: Exchange Server 2013 reaches end of support in April
https://www.bleepingcomputer.com/news/security/microsoft-exchange-server-2013-reaches-end-of-support-in-april/
BleepingComputer.com
https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2023-patch-tuesday-fixes-3-exploited-zero-days-77-flaws/
https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5022834-and-kb5022840-updates-released/
https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5022845-and-kb5022836-cumulative-updates-released/
SANS Internet Storm Center
https://isc.sans.edu/diary/Microsoft%20February%202023%20Patch%20Tuesday/29548
Krebs on Security
https://krebsonsecurity.com/2023/02/microsoft-patch-tuesday-february-2023-edition/
Mitre CVE
I riferimenti CVE sono disponibili nell'advisory originale.
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iGsEAREIACsWIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCY+z6+w0cY2VydEBnYXJy
Lml0AAoJEMGcTJNlEmBC+gQAmgP5O6MWh+FaXdweB1jhghxgWskwAKCoGlNCIj8r
4vRMrPOAW437wSeG4Q==
=Wpel
-----END PGP SIGNATURE-----