Microsoft security alert.
April 14, 2015
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 26 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Internet Explorer Cumulative Security Update (MS15-032)
- Severity
- Urgent 5
- Qualys ID
- 100229
- Vendor Reference
- MS15-032
- CVE Reference
- CVE-2015-1652, CVE-2015-1657, CVE-2015-1659, CVE-2015-1660, CVE-2015-1661, CVE-2015-1662, CVE-2015-1665, CVE-2015-1666, CVE-2015-1667, CVE-2015-1668
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
- Consequence
- Successful exploitation of this vulnerability will allow an attacker to execute arbitrary code, failed exploits may result in denial of service.
- Solution
-
Refer to Microsoft Security Bulletin MS15-032 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-032 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-032 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-032 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-032 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-032 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS15-032 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS15-032 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS15-032 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS15-032 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-032 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-032 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-032 Windows Server 2012(Internet Explorer 10)
MS15-032 Windows Server 2012 R2(Internet Explorer 11)
MS15-032 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-032 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-032 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-032 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-032 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-032 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Office Remote Code Execution Vulnerabilities (MS15-033)
- Severity
- Urgent 5
- Qualys ID
- 110252
- Vendor Reference
- MS15-033
- CVE Reference
- CVE-2015-1639, CVE-2015-1641, CVE-2015-1649, CVE-2015-1650, CVE-2015-1651
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Office is prone to the following vulnerabilities:
A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle rich text format files in memory.
Remote code execution vulnerabilities exist in Microsoft Office software that are caused when the Office software improperly handles objects in memory while parsing specially crafted Office files.
An elevation of privilege vulnerability exists in the Microsoft Outlook for Mac app that is caused when the software improperly sanitizes HTML strings.
Microsoft has released a security update that addresses the vulnerabilities by correcting how Microsoft Office parses specially crafted files, by correcting how Office handles files in memory, and by helping to ensure that SharePoint Server properly sanitizes user input.
- Consequence
- Successfully exploiting these vulnerabilities might allow a remote attacker to execute arbitrary code or gain escalated privileges.
- Solution
-
Refer to MS15-033 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-033 Microsoft Office 2007 Service Pack 3(Microsoft Word 2007 Service Pack 3)
MS15-033 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Word 2010 Service Pack 2 (32-bit editions))
MS15-033 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-033 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Word 2010 Service Pack 2 (64-bit editions))
MS15-033 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-033 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Word 2013 Service Pack 1 (32-bit editions))
MS15-033 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Word 2013 Service Pack 1 (64-bit editions))
MS15-033 Microsoft Office Compatibility Pack Service Pack 3
MS15-033 Microsoft Office Web Apps 2010 Service Pack 2(Microsoft Office Web Apps Server 2010 Service Pack 2)
MS15-033 Microsoft Office Web Apps 2013 Service Pack 1(Microsoft Office Web Apps Server 2013 Service Pack 1)
MS15-033 Microsoft Office for Mac 2011(Microsoft Word for Mac 2011)
MS15-033 Microsoft Office for Mac 2011
MS15-033 Microsoft Outlook for Mac for Office 365
MS15-033 Microsoft SharePoint Server 2010 Service Pack 2(Word Automation Services)
MS15-033 Microsoft SharePoint Server 2013 Service Pack 1(Word Automation Services)
MS15-033 Microsoft Word Viewer
-
Microsoft Windows HTTP.sys Remote Code Execution Vulnerability (MS15-034)
- Severity
- Urgent 5
- Qualys ID
- 91041
- Vendor Reference
- MS15-034
- CVE Reference
- CVE-2015-1635
- CVSS Scores
- Base 10 / Temporal 8.3
- Description
-
Windows is prone to a remote code execution affecting the HTTP protocol stack (HTTP.sys).
The vulnerability is caused when the HTTP protocol stack (HTTP.sys) improperly parses crafted HTTP requests.
Microsoft has released a security update that addresses the vulnerability by correcting the way that HTTP.sys handles requests.
This security update is rated Critical for supported editions of Windows 7, Windows 8, Windows 2008 R2 and Windows Server 2012.
- Consequence
- The vulnerability could allow remote code execution if an attacker successfully sends crafted HTTP requests to an affected Windows system.
- Solution
-
Refer to MS15-034 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-034 Windows 7 for 32-bit Systems Service Pack 1
MS15-034 Windows 7 for x64-based Systems Service Pack 1
MS15-034 Windows 8 for 32-bit Systems
MS15-034 Windows 8 for x64-based Systems
MS15-034 Windows 8.1 for 32-bit Systems
MS15-034 Windows 8.1 for x64-based Systems
MS15-034 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-034 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-034 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-034 Windows Server 2012
MS15-034 Windows Server 2012
MS15-034 Windows Server 2012 R2
MS15-034 Windows Server 2012 R2
-
Microsoft Graphics Component Remote Code Execution Vulnerability (MS15-035)
- Severity
- Urgent 5
- Qualys ID
- 91038
- Vendor Reference
- MS15-035
- CVE Reference
- CVE-2015-1645
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
A remote code execution vulnerability exists in the way that Microsoft Windows improperly processes certain, specially crafted Enhanced Metafile (EMF) image format files.
Affected Software:
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1The security update is rated Critical for all supported releases of Microsoft Windows.
- Consequence
- An attacker who successfully exploited the vulnerability can run arbitrary code as the logged-on user. An attacker can then install programs, view, change, or delete data, or create new accounts with full user rights.
- Solution
-
Refer to MS15-035 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-035 Windows 7 for 32-bit Systems Service Pack 1
MS15-035 Windows 7 for x64-based Systems Service Pack 1
MS15-035 Windows Server 2003 Service Pack 2
MS15-035 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-035 Windows Server 2003 x64 Edition Service Pack 2
MS15-035 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-035 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-035 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-035 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-035 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-035 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-035 Windows Vista Service Pack 2
MS15-035 Windows Vista x64 Edition Service Pack 2
-
Microsoft SharePoint Server Elevation of Privilege Vulnerability (MS15-036)
- Severity
- Critical 4
- Qualys ID
- 110253
- Vendor Reference
- MS15-036
- CVE Reference
- CVE-2015-1640, CVE-2015-1653
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
-
Elevation of privilege vulnerabilities exist when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.
Affected Software:
Microsoft SharePoint Server 2013 Service Pack 1
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Project Server 2013 Service Pack 1
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Project Server 2010 Service Pack 2The security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- The attacker who successfully exploited these vulnerabilities can run script in the security context of the current user. These attacks can allow the attacker to read content that the attacker is not authorized to read, use the victims identity to take actions on the SharePoint site on behalf of the victim, such as change permissions and delete content, and inject malicious content in the browser of the victim.
- Solution
-
Refer to MS15-036 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
-
Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (MS15-037)
- Severity
- Serious 3
- Qualys ID
- 91044
- Vendor Reference
- MS15-037
- CVE Reference
- CVE-2015-0098
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
Task Scheduler is a Windows service that enables the automation of routine tasks on a chosen computer. Task Scheduler does this by monitoring the criteria the user has chosen for initiating tasks (referred to as triggers) and then executing the tasks when the criteria has been met. For more information, see the MSDN Library entry.
An elecvation of privilege vulnerability exists in the Task Scheduler due to a known invalid task being present on certain systems.
This security update is rated Important for supported editions of Windows 7 and Windows 2008 R2.
- Consequence
- An attacker who successfully exploited this vulnerability could cause the Task Scheduler to run a crafted application in the context of the System Account.
- Solution
-
Refer to MS15-037 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-037 Windows 7 for 32-bit Systems Service Pack 1
MS15-037 Windows 7 for x64-based Systems Service Pack 1
MS15-037 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-037 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-037 Windows Server 2008 R2 for x64-based Systems Service Pack 1
-
Microsoft Windows Elevation of Privilege Vulnerability (MS15-038)
- Severity
- Serious 3
- Qualys ID
- 91039
- Vendor Reference
- MS15-038
- CVE Reference
- CVE-2015-1643, CVE-2015-1644
- CVSS Scores
- Base 7.2 / Temporal 5.6
- Description
-
Two elevation of privilege vulnerability exists in Microsoft Windows when it fails to properly validate and enforce impersonation levels. An attacker who successfully exploited this vulnerability could bypass impersonation-level security checks and gain elevated privileges on a targeted system (CVE-2015-1643,CVE-2015-1643) .
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- Successfully exploiting these vulnerabilities might allow an authenticated user to gain escalated privileges.
- Solution
-
Refer to MS15-038 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-038 Windows 7 for 32-bit Systems Service Pack 1
MS15-038 Windows 7 for 32-bit Systems Service Pack 1
MS15-038 Windows 7 for x64-based Systems Service Pack 1
MS15-038 Windows 7 for x64-based Systems Service Pack 1
MS15-038 Windows 8 for 32-bit Systems
MS15-038 Windows 8 for 32-bit Systems
MS15-038 Windows 8 for x64-based Systems
MS15-038 Windows 8 for x64-based Systems
MS15-038 Windows 8.1 for 32-bit Systems
MS15-038 Windows 8.1 for 32-bit Systems
MS15-038 Windows 8.1 for x64-based Systems
MS15-038 Windows 8.1 for x64-based Systems
MS15-038 Windows Server 2003 R2 Service Pack 2
MS15-038 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-038 Windows Server 2003 Service Pack 2
MS15-038 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-038 Windows Server 2003 x64 Edition Service Pack 2
MS15-038 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-038 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012 R2
MS15-038 Windows Server 2012 R2
MS15-038 Windows Server 2012 R2
MS15-038 Windows Server 2012 R2
MS15-038 Windows Vista Service Pack 2
MS15-038 Windows Vista Service Pack 2
MS15-038 Windows Vista x64 Edition Service Pack 2
MS15-038 Windows Vista x64 Edition Service Pack 2
-
Microsoft XML Core Services Security Feature Bypass (MS15-039)
- Severity
- Serious 3
- Qualys ID
- 123518
- Vendor Reference
- MS15-039
- CVE Reference
- CVE-2015-1646
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
-
Microsoft XML Core Services (MSXML) allows customers who use JScript, Visual Basic Scripting Edition (VBScript), and Microsoft Visual Studio 6.0 to develop XML-based applications that provide interoperability with other applications that adhere to the XML 1.0 standard.
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if a user opens a specially crafted file.
This security update for Microsoft XML Core Services 3.0 is rated Important for all supported editions of Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
- Consequence
- Successfully exploiting this vulnerability might allow a remote attacker to access sensitive user information, such as username or password.
- Solution
-
Refer to Microsoft Security Bulletin MS15-039 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-039 Windows 7 for 32-bit Systems Service Pack 1
MS15-039 Windows 7 for x64-based Systems Service Pack 1
MS15-039 Windows Server 2003 Service Pack 2
MS15-039 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-039 Windows Server 2003 x64 Edition Service Pack 2
MS15-039 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-039 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-039 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-039 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-039 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-039 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-039 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-039 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-039 Windows Vista Service Pack 2
MS15-039 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Active Directory Information Disclosure Vulnerability (MS15-040)
- Severity
- Critical 4
- Qualys ID
- 91042
- Vendor Reference
- MS15-040
- CVE Reference
- CVE-2015-1638
- CVSS Scores
- Base 5.8 / Temporal 4.3
- Description
-
This security update resolves a vulnerability in Active Directory Federation Services (AD FS).
An information disclosure vulnerability exists when Active Directory Federation Services (AD FS) fails to properly log off a user. The vulnerability could allow unintentional information disclosure.
This security update is rated Important for AD FS 3.0 when installed on x64-based editions of Windows Server 2012 R2. - Consequence
- An attacker who successfully exploited this vulnerability could gain access to a user's information by reopening an application from which the user logged off.
- Solution
-
Refer to MS15-040 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-040 Windows Server 2012 R2(Active Directory Federation Services 3.0)
MS15-040 Windows Server 2012 R2 (Server Core installation)(Active Directory Federation Services 3.0)
-
Microsoft .NET Framework Information Disclosure Vulnerability (MS15-041)
- Severity
- Serious 3
- Qualys ID
- 91040
- Vendor Reference
- MS15-041
- CVE Reference
- CVE-2015-1648
- CVSS Scores
- Base 2.6 / Temporal 1.9
- Description
-
The Microsoft .NET Framework is a software framework for computers running Microsoft Windows operating systems.
An information disclosure vulnerability exists in ASP.NET that is caused when ASP.NET improperly handles certain requests on systems that have custom error messages disabled. An attacker who successfully exploited the vulnerability would be able to view parts of a web configuration file, which could expose sensitive information (CVE-2015-1648).
This security update is rated Important for Microsoft .NET Framework 1.1 Service Pack 1, Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4, Microsoft .NET Framework 4.5, Microsoft .NET Framework 4.5.1, and Microsoft .NET Framework 4.5.2 on affected releases of Microsoft Windows.
- Consequence
- Successfully exploiting this vulnerability might allow a remote attacker to gain access to some sensitive information.
- Solution
-
Refer to MS15-041 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-041 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 8 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8 for 32-bit Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 8 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8 for x64-based Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 1.1 Service Pack 1)
MS15-041 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 4)
MS15-041 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2012(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012 R2(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
-
Microsoft Hyper-V Denial of Service Vulnerability (MS15-042)
- Severity
- Urgent 5
- Qualys ID
- 91043
- Vendor Reference
- MS15-042
- CVE Reference
- CVE-2015-1647
- CVSS Scores
- Base 2.1 / Temporal 1.6
- Description
-
A denial of service vulnerability exists in Hyper-V when an authenticated attacker runs a specially crafted application in a virtual machine (VM) session. The security update addresses the vulnerability by correcting how Virtual Machine Manager validates user input.
This security update is rated Important for Windows 8.1 for x64-based Systems and Windows Server 2012 R2. - Consequence
- The vulnerability could allow denial of service if an authenticated attacker runs a specially crafted application in a virtual machine (VM) session. Note that the denial of service does not allow an attacker to execute code or elevate user rights on other VMs running on the Hyper-V host; however, it could cause other VMs on the host to not be manageable in Virtual Machine Manager.
- Solution
-
Refer to MS15-042 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-042 Windows 8.1 for x64-based Systems
MS15-042 Windows Server 2012 R2
MS15-042 Windows Server 2012 R2
These new vulnerability checks are included in Qualys vulnerability signature 2.2.985-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 100229
- 110252
- 91041
- 91038
- 110253
- 91044
- 91039
- 123518
- 91042
- 91040
- 91043
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.