Qualys Vulnerability R&D Lab has released new vulnerability checks in the Qualys Cloud Platform to protect organizations against 57 vulnerabilities that were fixed in 9 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 9 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
A vulnerability exists in Virtual Machine Manager (VMM) when VMM improperly validates user roles.
Affected Software:
Microsoft System Center Virtual Machine Manager 2012 R2 Update Rollup 4.
This security update is rated Important for Microsoft System Center 2012 R2 Virtual Machine Manager Update Rollup 4.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-017 VMM Server update 3023195
Microsoft has released a security update that addresses the vulnerability by correcting how Windows processes TIFF image format files.
The security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-016 Windows 7 for 32-bit Systems Service Pack 1
MS15-016 Windows 7 for x64-based Systems Service Pack 1
MS15-016 Windows 8 for 32-bit Systems
MS15-016 Windows 8 for x64-based Systems
MS15-016 Windows 8.1 for 32-bit Systems
MS15-016 Windows 8.1 for x64-based Systems
MS15-016 Windows Server 2003 Service Pack 2
MS15-016 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-016 Windows Server 2003 x64 Edition Service Pack 2
MS15-016 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-016 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-016 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-016 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-016 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-016 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-016 Windows Server 2012
MS15-016 Windows Server 2012
MS15-016 Windows Server 2012 R2
MS15-016 Windows Server 2012 R2
MS15-016 Windows Vista Service Pack 2
MS15-016 Windows Vista x64 Edition Service Pack 2
This security update resolves one publicly disclosed and forty privately reported vulnerabilities in Internet Explorer.
The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory, by adding additional permission validations to Internet Explorer, by helping to ensure that affected versions of Internet Explorer properly implement the ASLR security feature, and by helping to ensure that cross-domain policies are properly enforced in Internet Explorer.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-009 Windows 7 for 32-bit Systems Service Pack 1(3021952)
MS15-009 Windows 7 for 32-bit Systems Service Pack 1(3021952)
MS15-009 Windows 7 for 32-bit Systems Service Pack 1(3021952)
MS15-009 Windows 7 for 32-bit Systems Service Pack 1(3021952)
MS15-009 Windows 7 for 32-bit Systems Service Pack 1(3034196)
MS15-009 Windows 7 for 32-bit Systems Service Pack 1(3034196)
MS15-009 Windows 7 for 32-bit Systems Service Pack 1(3034196)
MS15-009 Windows 7 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows 7 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows 7 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows 7 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows 7 for x64-based Systems Service Pack 1(3034196)
MS15-009 Windows 7 for x64-based Systems Service Pack 1(3034196)
MS15-009 Windows 7 for x64-based Systems Service Pack 1(3034196)
MS15-009 Windows 8 for 32-bit Systems(3021952)
MS15-009 Windows 8 for 32-bit Systems(3034196)
MS15-009 Windows 8 for x64-based Systems(3021952)
MS15-009 Windows 8 for x64-based Systems(3034196)
MS15-009 Windows 8.1 for 32-bit Systems(3021952)
MS15-009 Windows 8.1 for 32-bit Systems(3034196)
MS15-009 Windows 8.1 for x64-based Systems(3021952)
MS15-009 Windows 8.1 for x64-based Systems(3034196)
MS15-009 Windows Server 2003 Service Pack 2(3021952)
MS15-009 Windows Server 2003 Service Pack 2(3021952)
MS15-009 Windows Server 2003 Service Pack 2(3021952)
MS15-009 Windows Server 2003 with SP2 for Itanium-based Systems(3021952)
MS15-009 Windows Server 2003 with SP2 for Itanium-based Systems(3021952)
MS15-009 Windows Server 2003 x64 Edition Service Pack 2(3021952)
MS15-009 Windows Server 2003 x64 Edition Service Pack 2(3021952)
MS15-009 Windows Server 2003 x64 Edition Service Pack 2(3021952)
MS15-009 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(3021952)
MS15-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(3021952)
MS15-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(3034196)
MS15-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(3034196)
MS15-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(3034196)
MS15-009 Windows Server 2008 for 32-bit Systems Service Pack 2(3021952)
MS15-009 Windows Server 2008 for 32-bit Systems Service Pack 2(3021952)
MS15-009 Windows Server 2008 for 32-bit Systems Service Pack 2(3021952)
MS15-009 Windows Server 2008 for 32-bit Systems Service Pack 2(3034196)
MS15-009 Windows Server 2008 for Itanium-based Systems Service Pack 2(3021952)
MS15-009 Windows Server 2008 for x64-based Systems Service Pack 2(3021952)
MS15-009 Windows Server 2008 for x64-based Systems Service Pack 2(3021952)
MS15-009 Windows Server 2008 for x64-based Systems Service Pack 2(3021952)
MS15-009 Windows Server 2008 for x64-based Systems Service Pack 2(3034196)
MS15-009 Windows Server 2012(3021952)
MS15-009 Windows Server 2012(3034196)
MS15-009 Windows Server 2012 R2(3021952)
MS15-009 Windows Server 2012 R2(3034196)
MS15-009 Windows Vista Service Pack 2(3021952)
MS15-009 Windows Vista Service Pack 2(3021952)
MS15-009 Windows Vista Service Pack 2(3021952)
MS15-009 Windows Vista Service Pack 2(3034196)
MS15-009 Windows Vista x64 Edition Service Pack 2(3021952)
MS15-009 Windows Vista x64 Edition Service Pack 2(3021952)
MS15-009 Windows Vista x64 Edition Service Pack 2(3021952)
MS15-009 Windows Vista x64 Edition Service Pack 2(3034196)
This security update is rated Critical for all supported editions of Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1; it is rated Important for all supported editions of Windows Server 2003, Windows Vista, and Windows Server 2008.
Note: Windows XP is end of life and is vulnerable to this issue. For further details see Exploits Against Obsolete Software.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-010 Windows 7 for 32-bit Systems Service Pack 1
MS15-010 Windows 7 for 32-bit Systems Service Pack 1
MS15-010 Windows 7 for x64-based Systems Service Pack 1
MS15-010 Windows 7 for x64-based Systems Service Pack 1
MS15-010 Windows 8 for 32-bit Systems
MS15-010 Windows 8 for 32-bit Systems
MS15-010 Windows 8 for x64-based Systems
MS15-010 Windows 8 for x64-based Systems
MS15-010 Windows 8.1 for 32-bit Systems
MS15-010 Windows 8.1 for 32-bit Systems
MS15-010 Windows 8.1 for x64-based Systems
MS15-010 Windows 8.1 for x64-based Systems
MS15-010 Windows Server 2003 Service Pack 2
MS15-010 Windows Server 2003 Service Pack 2
MS15-010 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-010 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-010 Windows Server 2003 x64 Edition Service Pack 2
MS15-010 Windows Server 2003 x64 Edition Service Pack 2
MS15-010 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-010 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-010 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-010 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-010 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-010 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-010 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-010 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-010 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-010 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-010 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-010 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-010 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-010 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-010 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-010 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-010 Windows Server 2012
MS15-010 Windows Server 2012
MS15-010 Windows Server 2012
MS15-010 Windows Server 2012
MS15-010 Windows Server 2012 R2
MS15-010 Windows Server 2012 R2
MS15-010 Windows Server 2012 R2
MS15-010 Windows Server 2012 R2
MS15-010 Windows Vista Service Pack 2
MS15-010 Windows Vista Service Pack 2
MS15-010 Windows Vista x64 Edition Service Pack 2
MS15-010 Windows Vista x64 Edition Service Pack 2
This security update is rated Critical for all supported editions of Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1
Note: There is no update released for Windows 2003. This vulnerability requires that a user connect their computer to an untrusted network such as a Wi-Fi hotspot in a coffee shop; therefore, workstations that are connected to an untrusted network are most at risk from this vulnerability.
QID Detection Logic (Authenticated):
Operating Systems: Windows Vista, Windows Server 2008, Windows Server 2008 R2, Windows 7, Windows 8, Windows RT, Windows RT 8.1, Windows Server 2012
This QID checks for the file version of %windir%\system32\gpsvc.dll
The following KBs are checked:
The patch version of 6.0.6002.19279 (KB3000483)
The patch version of 6.0.6002.23588 (KB3000483)
The patch version of 6.1.7601.18711 (KB3000483)
The patch version of 6.1.7601.22917 (KB3000483)
The patch version of 6.2.9200.17225 (KB3000483)
The patch version of 6.2.9200.21339 (KB3000483)
The patch version of 6.3.9600.17630 (KB3000483)
In addition, Registry Key - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\History - checks if system is connected to the domain. If yes, then following Minimum recommended settings mentioned in KB3000483 are checked:-
1. Registry key - HKLM\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths with value "Netlogon" contains data - RequireMutualAuthentication=1, RequireIntegrity=1
2. Registry key - HKLM\SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths with value "Sysvol" contains data - RequireMutualAuthentication=1, RequireIntegrity=1
Value Name Value \\*\NETLOGON RequireMutualAuthentication=1, RequireIntegrity=1 \\*\SYSVOL RequireMutualAuthentication=1, RequireIntegrity=1
In some environments, to be completely protected from the vulnerability, additional configuration by a system administrator is required in addition to deploying this security update. Refer to Microsoft Knowledge Base Article KB3000483 to obtain further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-011 Windows 7 for 32-bit Systems Service Pack 1
MS15-011 Windows 7 for x64-based Systems Service Pack 1
MS15-011 Windows 8 for 32-bit Systems
MS15-011 Windows 8 for x64-based Systems
MS15-011 Windows 8.1 for 32-bit Systems
MS15-011 Windows 8.1 for x64-based Systems
MS15-011 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-011 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-011 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-011 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-011 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-011 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-011 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-011 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-011 Windows Server 2012
MS15-011 Windows Server 2012
MS15-011 Windows Server 2012 R2
MS15-011 Windows Server 2012 R2
MS15-011 Windows Vista Service Pack 2
MS15-011 Windows Vista x64 Edition Service Pack 2
These vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file.
This security update is rated Important for all supported editions of Microsoft Excel 2007, Microsoft Word 2007, Microsoft Office 2010, Microsoft Excel 2010, Microsoft Word 2010, Microsoft Web Applications 2010, Microsoft Excel 2013, Microsoft Word Viewer, Microsoft Excel Viewer, and Microsoft Office Compatibility Pack.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-012 Microsoft Excel Viewer
MS15-012 Microsoft Office 2007 Service Pack 3(Microsoft Excel 2007 Service Pack 3)
MS15-012 Microsoft Office 2007 Service Pack 3(Microsoft Word 2007 Service Pack 3)
MS15-012 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Excel 2010 Service Pack 2 (32-bit editions))
MS15-012 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Word 2010 Service Pack 2 (32-bit editions))
MS15-012 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-012 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-012 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Excel 2010 Service Pack 2 (64-bit editions))
MS15-012 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Word 2010 Service Pack 2 (64-bit editions))
MS15-012 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-012 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-012 Microsoft Office 2013 (32-bit editions)(Microsoft Excel 2013 (32-bit editions))
MS15-012 Microsoft Office 2013 (64-bit editions)(Microsoft Excel 2013 (64-bit editions))
MS15-012 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Excel 2013 Service Pack 1 (32-bit editions))
MS15-012 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Excel 2013 Service Pack 1 (64-bit editions))
MS15-012 Microsoft Office Compatibility Pack Service Pack 3
MS15-012 Microsoft Office Compatibility Pack Service Pack 3
MS15-012 Microsoft Office Web Apps 2010 Service Pack 2(Microsoft Web Applications 2010 Service Pack 2)
MS15-012 Microsoft SharePoint Server 2010 Service Pack 2(Word Automation Services)
MS15-012 Microsoft Word Viewer
The vulnerability could allow security feature bypass if a user opens a specially crafted Microsoft Office file.
This security update is rated Important for all supported editions of Microsoft Office 2007, Microsoft Office 2010, and Microsoft Office 2013.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-013 Microsoft Office 2007 Service Pack 3
MS15-013 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-013 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-013 Microsoft Office 2013 (32-bit editions)
MS15-013 Microsoft Office 2013 (64-bit editions)
MS15-013 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-013 Microsoft Office 2013 Service Pack 1 (64-bit editions)
The security update addresses the vulnerability by correcting how Group Policy settings are applied when the Security Configuration Engine policy file is corrupted or otherwise unreadable.
This security update is rated Important for all supported releases of Microsoft Windows.
Refer to MS15-014 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-014 Windows 7 for 32-bit Systems Service Pack 1
MS15-014 Windows 7 for x64-based Systems Service Pack 1
MS15-014 Windows 8 for 32-bit Systems
MS15-014 Windows 8 for x64-based Systems
MS15-014 Windows 8.1 for 32-bit Systems
MS15-014 Windows 8.1 for x64-based Systems
MS15-014 Windows Server 2003 Service Pack 2
MS15-014 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-014 Windows Server 2003 x64 Edition Service Pack 2
MS15-014 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-014 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-014 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-014 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-014 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-014 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-014 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-014 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-014 Windows Server 2012
MS15-014 Windows Server 2012
MS15-014 Windows Server 2012 R2
MS15-014 Windows Server 2012 R2
MS15-014 Windows Vista Service Pack 2
MS15-014 Windows Vista x64 Edition Service Pack 2
Affected Software:
Windows 7 Service Pack 1
Windows Server 2008 R2 Service Pack 1
Windows 8 and Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT and Windows RT 8.1
This security update is rated Important.
Refer to MS15-015 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-015 Windows 7 for 32-bit Systems Service Pack 1
MS15-015 Windows 7 for x64-based Systems Service Pack 1
MS15-015 Windows 8 for 32-bit Systems
MS15-015 Windows 8 for x64-based Systems
MS15-015 Windows 8.1 for 32-bit Systems
MS15-015 Windows 8.1 for x64-based Systems
MS15-015 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-015 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-015 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-015 Windows Server 2012
MS15-015 Windows Server 2012
MS15-015 Windows Server 2012 R2
MS15-015 Windows Server 2012 R2
These new vulnerability checks are included in Qualys vulnerability signature 2.2.934-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Qualys Cloud Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.