9VSA20-00122-01 CSIRT comparte actualizaciones entregadas por Microsoft

CSIRT comparte la información entregada por Microsoft

Resumen

El Equipo de Respuesta ante Incidentes de Seguridad Informática, CSIRT, comparte la información entregada por Microsoft en su reporte mensual de actualizaciones correspondiente a Enero de 2020, parchando 14 vulnerabilidades en sus softwares. Además se informa de 36 vulnerabilidades adicionales al reporte mensual.

Entre la información entregada por Microsoft, se destaca la vulnerabilidad CVE-2020-0601, ya que esta vulnerabilidad afecta a todas las máquinas que ejecutan sistemas operativos Windows 10 de 32 o 64 bits, incluidas las versiones de Windows Server 2016 y 2019. Esta vulnerabilidad permite que la validación del certificado de Elliptic Curve Cryptography (ECC) omita el almacén de confianza, permitiendo que el software no deseado o malicioso se disfrace como firmado auténticamente por una organización confiable. Esto podría engañar a los usuarios o frustrar los métodos de detección de malware, como los antivirus. Además, se podría emitir un certificado creado con fines malintencionados para un nombre de host que no lo autorizó, y un navegador que se base en Windows CryptoAPI no emitiría una advertencia, lo que permitiría a un atacante descifrar, modificar o inyectar datos en las conexiones del usuario sin detección.

Vulnerabilidades

Reportados en el informe de Enero:

CVE-2020-0601

CVE-2020-0607

CVE-2020-0608

CVE-2020-0615

CVE-2020-0622

CVE-2020-0637

CVE-2020-0639

CVE-2020-0643

CVE-2020-0647

CVE-2020-0650

CVE-2020-0651

CVE-2020-0652

CVE-2020-0653

CVE-2020-0654

Reportados adicionalmente:

CVE-2019-1491

CVE-2020-0602

CVE-2020-0603

CVE-2020-0605

CVE-2020-0606

CVE-2020-0609

CVE-2020-0610

CVE-2020-0611

CVE-2020-0612

CVE-2020-0613

CVE-2020-0614

CVE-2020-0616

CVE-2020-0617

CVE-2020-0620

CVE-2020-0621

CVE-2020-0623

CVE-2020-0624

CVE-2020-0625

CVE-2020-0626

CVE-2020-0627

CVE-2020-0628

CVE-2020-0629

CVE-2020-0630

CVE-2020-0631

CVE-2020-0632

CVE-2020-0633

CVE-2020-0634

CVE-2020-0635

CVE-2020-0636

CVE-2020-0638

CVE-2020-0640

CVE-2020-0641

CVE-2020-0642

CVE-2020-0644

CVE-2020-0646

CVE-2020-0656

Productos Afectados

  • .NET Core 3.0 y 3.1
  • ASP.NET Core 2.1, 3.0 y 3.1
  • Dynamics 365 Field Service (on-premises) v7 series
  • Internet Explorer 9, 10, 11
  • Microsoft .NET Framework
    • 3.0 Service Pack 2
    • 3.5
    • 4.8 y anteriores
  • Microsoft Excel
    • 2010 Service Pack 2 (32-bit y 64-bit editions)
    • 2013 RT Service Pack 1
    • 2013 Service Pack 1 (32-bit y 64-bit editions)
    • 2016 (32-bit y 64-bit editions)
  • Microsoft Office
    • 2010 Service Pack 2 (32-bit y 64-bit editions)
    • 2013 RT Service Pack 1
    • 2013 Service Pack 1 (32-bit y 64-bit editions)
    • 2016 (32-bit y 64-bit editions)
    • 2016 para Mac
    • 2019 (32-bit y 64-bit editions)
    • 2019 para Mac
  • Microsoft SharePoint
    • Enterprise Server 2016
    • Foundation 2010 Service Pack 2
    • Foundation 2013 Service Pack 1
    • Server 2019
  • Office 365 ProPlus (32-bit y 64-bit editions)
  • Office Online Server
  • One Drive for Android
  • Windows 10
    • Version 1607, 1703, 1709, 1803, 1809, 1903, para 32 y 64 bit
  • Windows 7
    • 32-bit Systems Service Pack 1
    • x64-based Systems Service Pack 1
  • Windows 8.1
    • 32-bit systems
    • x64-based systems
  • Windows Defender
  • Windows RT 8.1
  • Windows Server 2008
    • 32-bit Systems Service Pack 2
    • 32-bit Systems Service Pack 2 (Server Core installation)
    • Itanium-Based Systems Service Pack 2
    • x64-based Systems Service Pack 2
    • x64-based Systems Service Pack 2 (Server Core installation)
    • R2 for Itanium-Based Systems Service Pack 1
    • R2 for x64-based Systems Service Pack 1
    • R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Windows Server 2012
    • 2012
    • Server Core installation
    • R2 y R2 (Server Core installation)
  • Windows Server 2016
    • 2016
    • Server Core installation
  • Windows Server 2019
    • 2019
    • Server Core installation
  • Windows Server
    • version 1803 (Server Core Installation)
    • version 1903 (Server Core installation)

Mitigación

Aplicar las actualizaciones publicadas por el fabricante.

Enlace

https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jan

https://portal.msrc.microsoft.com/en-us/security-guidance

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0607

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0608

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0615

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0622

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0637

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0639

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0643

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0647

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0650

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0651

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0652

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0653

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0654

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1491

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0605

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0606

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0609

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0611

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0612

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0613

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0614

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0616

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0617

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0620

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0621

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0623

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0624

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0625

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0626

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0627

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0628

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0629

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0630

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0631

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0632

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0633

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0634

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0635

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0636

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0638

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0640

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0641

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0642

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0644

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0646

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0656

Informe

El informe oficial publicado por el CSIRT del Gobierno de Chile está disponible en el siguiente enlace: 9VSA20-00122-01