Microsoft security alert.
May 12, 2015
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 46 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Office Remote Code Execution Vulnerabilities (MS15-046)
- Severity
- Critical 4
- Qualys ID
- 110255
- Vendor Reference
- MS15-046
- CVE Reference
- CVE-2015-1682, CVE-2015-1683
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
This security update resolves vulnerabilities in Microsoft Office.
The security update addresses the vulnerabilities by correcting how Microsoft Office parses specially crafted files, by correcting how Office handles files in memory, and by helping to ensure that SharePoint Server properly sanitizes user input.
This security update is rated Important.Affected Versions:-
Microsoft Office 2007
Microsoft Office 2010, Microsoft Excel 2010, Microsoft PowerPoint 2010, Microsoft Word 2010
Microsoft Office 2013, Microsoft Excel 2013, Microsoft PowerPoint 2013, Microsoft Word 2013
Microsoft Office 2013 RT, Microsoft Excel 2013 RT, Microsoft Word 2013 RT
Microsoft Office for Mac 2011, Microsoft Excel for Mac 2011, Microsoft PowerPoint for Mac 2011, Microsoft Word for Mac 2011
Microsoft PowerPoint Viewer
Word Automation Services on Microsoft SharePoint Server 2010, Excel Services on Microsoft SharePoint Server 2010
Word Automation Services on Microsoft SharePoint Server 2013, Excel Services on Microsoft SharePoint Server 2013
Microsoft Office Web Apps 2010, Microsoft Excel Web App 2010
Word Automation Services on Microsoft SharePoint Server 2013
Microsoft Office Web Apps Server 2013
Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
- Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Refer to MS15-046 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-046 Microsoft Office 2007 Service Pack 3
MS15-046 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Excel 2010 Service Pack 2 (32-bit editions))
MS15-046 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions))
MS15-046 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Word 2010 Service Pack 2 (32-bit editions))
MS15-046 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-046 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-046 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-046 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Excel 2010 Service Pack 2 (64-bit editions))
MS15-046 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions))
MS15-046 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Word 2010 Service Pack 2 (64-bit editions))
MS15-046 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-046 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-046 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-046 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Excel 2013 Service Pack 1 (32-bit editions))
MS15-046 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions))
MS15-046 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Word 2013 Service Pack 1 (32-bit editions))
MS15-046 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-046 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Excel 2013 Service Pack 1 (64-bit editions))
MS15-046 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions))
MS15-046 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Word 2013 Service Pack 1 (64-bit editions))
MS15-046 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS15-046 Microsoft Office Web Apps 2010 Service Pack 2(Microsoft Excel Web Apps 2010 Service Pack 2)
MS15-046 Microsoft Office Web Apps 2010 Service Pack 2
MS15-046 Microsoft Office Web Apps Server 2013 Service Pack 1
MS15-046 Microsoft Office for Mac 2011(Microsoft Excel for Mac 2011)
MS15-046 Microsoft Office for Mac 2011(Microsoft PowerPoint for Mac 2011)
MS15-046 Microsoft Office for Mac 2011(Microsoft Word for Mac 2011)
MS15-046 Microsoft Office for Mac 2011
MS15-046 Microsoft PowerPoint Viewer
MS15-046 Microsoft SharePoint Server 2010 Service Pack 2(Excel Services)
MS15-046 Microsoft SharePoint Server 2010 Service Pack 2(Microsoft SharePoint Foundation 2010 Service Pack 2)
MS15-046 Microsoft SharePoint Server 2010 Service Pack 2(Word Automation Services)
MS15-046 Microsoft SharePoint Server 2013 Service Pack 1(Excel Services)
MS15-046 Microsoft SharePoint Server 2013 Service Pack 1(Word Automation Services)
MS15-046 Microsoft SharePoint Server 2013 Service Pack 1
MS15-046
MS15-046
-
Microsoft Windows Kernel Security Feature Bypass Vulnerability (MS15-052)
- Severity
- Serious 3
- Qualys ID
- 91058
- Vendor Reference
- MS15-052
- CVE Reference
- CVE-2015-1674
- CVSS Scores
- Base 4.6 / Temporal 3.6
- Description
-
A vulnerability could allow security feature bypass if an attacker logs on to an affected system and runs a specially crafted application.
This is due to the Windows kernel failing to properly validate which mode the request comes from, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass.
This security update is rated Important for supported editions of Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2.
- Consequence
- An attacker who successfully exploited this vulnerability can then retrieve the base address of cng.sys from a compromised process.
- Solution
-
Customers are advised to visit MS15-052 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-052 Windows 8 for 32-bit Systems
MS15-052 Windows 8 for x64-based Systems
MS15-052 Windows 8.1 for 32-bit Systems
MS15-052 Windows 8.1 for x64-based Systems
MS15-052 Windows Server 2012
MS15-052 Windows Server 2012
MS15-052 Windows Server 2012 R2
MS15-052 Windows Server 2012 R2
-
Microsoft Windows Microsoft Management Console File Format Denial of Service Vulnerability (MS15-054)
- Severity
- Serious 3
- Qualys ID
- 91055
- Vendor Reference
- MS15-054
- CVE Reference
- CVE-2015-1681
- CVSS Scores
- Base 1.9 / Temporal 1.4
- Description
-
Microsoft Windows is exposed to a vulnerability that allows an unauthenticated attacker to create a denial of service condition if the attacker can convince a user to open a share containing a specially crafted .msc file.
The vulnerability exists when Windows attempts to access a specially crafted .msc file to retrieve the icon information, and then fails to properly validate a destination buffer resulting in a denial of service.
This security update is rated Important for all supported editions of Microsoft Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2.
- Consequence
- Successfully exploiting this vulnerability might allow an attacker to cause denial-of-service like conditions.
- Solution
-
Refer to MS15-054 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-054
-
Microsoft Windows JScript and VBScript Scripting Engines Security Bypass Vulnerabilities (MS15-053)
- Severity
- Critical 4
- Qualys ID
- 91051
- Vendor Reference
- MS15-053
- CVE Reference
- CVE-2015-1684, CVE-2015-1686
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
-
A security feature bypass exists when the VBScript engine fails to use the Address Space Layout Randomization (ASLR) security feature, allowing an attacker to more reliably predict the memory offsets of specific instructions in a given call stack. (CVE-2015-1684)
A security feature bypass exists when the JScript and VBScript engines fail to use the Address Space Layout Randomization (ASLR) security feature, allowing an attacker to more reliably predict the memory offsets of specific instructions in a given call stack. (CVE-2015-1686)
Microsoft has released an update that addresses the ASLR bypasses by helping to ensure that affected versions of JScript and VBScript properly implement the ASLR security feature.
This security update is rated Important for affected versions of the JScript and VBScript scripting engines on supported editions of Windows Server 2003, Windows Vista, Windows Server 2008, and Server Core installations of Windows Server 2008 R2.
- Consequence
- An attacker could use one of these ASLR bypasses in conjunction with another vulnerability, such as a remote code execution vulnerability, to more reliably run arbitrary code on a target system.
- Solution
-
Refer to MS15-053 for more information.
Workaround:
1) Restrict access to VBScript.dll Impact of Workaround #1: Websites that use VBScript may not work properly.Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-053 Windows Server 2003 Service Pack 2(JScript 5.6 and VBScript 5.6)
MS15-053 Windows Server 2003 Service Pack 2(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Server 2003 with SP2 for Itanium-based Systems(JScript 5.6 and VBScript 5.6)
MS15-053 Windows Server 2003 with SP2 for Itanium-based Systems(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Server 2003 x64 Edition Service Pack 2(JScript 5.6 and VBScript 5.6)
MS15-053 Windows Server 2003 x64 Edition Service Pack 2(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(JScript 5.8 and VBScript 5.8)
MS15-053 Windows Server 2008 for 32-bit Systems Service Pack 2(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Server 2008 for Itanium-based Systems Service Pack 2(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Server 2008 for x64-based Systems Service Pack 2(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Vista Service Pack 2(JScript 5.7 and VBScript 5.7)
MS15-053 Windows Vista x64 Edition Service Pack 2(JScript 5.7 and VBScript 5.7)
-
Microsoft Internet Explorer Cumulative Security Update (MS15-043)
- Severity
- Critical 4
- Qualys ID
- 100232
- Vendor Reference
- MS15-043
- CVE Reference
- CVE-2015-1658, CVE-2015-1684, CVE-2015-1685, CVE-2015-1686, CVE-2015-1688, CVE-2015-1689, CVE-2015-1691, CVE-2015-1692, CVE-2015-1694, CVE-2015-1703, CVE-2015-1704, CVE-2015-1705, CVE-2015-1706, CVE-2015-1708, CVE-2015-1709, CVE-2015-1710, CVE-2015-1711, CVE-2015-1712, CVE-2015-1713, CVE-2015-1714, CVE-2015-1717, CVE-2015-1718
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers
- Consequence
- Successful exploitation of this vulnerability will allow an attacker to execute arbitrary code, failed exploits may result in denial of service.
- Solution
-
Refer to Microsoft Security Bulletin MS15-043 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-043 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-043 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-043 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-043 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-043 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-043 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-043 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-043 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-043 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-043 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-043 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-043 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-043 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS15-043 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS15-043 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS15-043 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS15-043 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS15-043 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS15-043 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS15-043 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS15-043 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-043 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-043 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-043 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-043 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-043 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-043 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-043 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-043 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-043 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-043 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-043 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-043 Windows Server 2012(Internet Explorer 10)
MS15-043 Windows Server 2012 R2(Internet Explorer 11)
MS15-043 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-043 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-043 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-043 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-043 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-043 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Windows Service Control Manager (SCM) Elevation of Privilege Vulnerability (MS15-050)
- Severity
- Critical 4
- Qualys ID
- 91048
- Vendor Reference
- MS15-050
- CVE Reference
- CVE-2015-1702
- CVSS Scores
- Base 6.9 / Temporal 5.1
- Description
-
An elevation of privilege vulnerability exists in the Windows Service Control Manager (SCM) when the SCM improperly verifies impersonation levels.
Microsoft has released an update that addresses the vulnerability by correcting the way that the SCM verifies impersonation levels.
This security update is rated Important for all supported editions of Microsoft Windows.
- Consequence
- An attacker who successfully exploited this vulnerability could gain elevated privileges and make calls to SCM for which they lack sufficient privilege.
- Solution
-
Refer to MS15-050 to obtain more information.
Note : Windows Server 2003 is listed as an affected product, however; Microsoft is not issuing an update for it because the comprehensive architectural changes required would jeopardize system stability and cause application compatibility problems. It is advisable to upgrade to a later operating system if you are running Windows Server 2003.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-050 Windows 7 for 32-bit Systems Service Pack 1
MS15-050 Windows 7 for x64-based Systems Service Pack 1
MS15-050 Windows 8 for 32-bit Systems
MS15-050 Windows 8 for x64-based Systems
MS15-050 Windows 8.1 for 32-bit Systems
MS15-050 Windows 8.1 for x64-based Systems
MS15-050 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-050 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-050 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-050 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-050 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-050 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-050 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-050 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-050 Windows Server 2012
MS15-050 Windows Server 2012
MS15-050 Windows Server 2012 R2
MS15-050 Windows Server 2012 R2
MS15-050 Windows Vista Service Pack 2
MS15-050 Windows Vista x64 Edition Service Pack 2
-
Microsoft Font Drivers Remote Code Execution Vulnerabilities (MS15-044)
- Severity
- Critical 4
- Qualys ID
- 91056
- Vendor Reference
- MS15-044
- CVE Reference
- CVE-2015-1670, CVE-2015-1671
- CVSS Scores
- Base 9.3 / Temporal 8.1
- Description
-
This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The more severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts.
Affected Software:
This security update is rated Critical for supported releases of Microsoft Windows and all affected editions of Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. - Consequence
-
An attacker who successfully exploited the vulnerability through Windows GDI+ and Windows components could run arbitrary code in kernel mode and take complete control of an affected system.
An attacker who successfully exploited the vulnerability through Microsoft Office, Microsoft Visual Studio, or Microsoft Lync could gain the same user rights as the current user.
- Solution
-
Refer to Microsoft Security Bulletin MS15-044 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-044 Microsoft Live Meeting 2007 Console
MS15-044 Microsoft Lync 2010
MS15-044 Microsoft Lync 2010
MS15-044 Microsoft Lync 2010 Attendee
MS15-044 Microsoft Lync 2010 Attendee
MS15-044 Microsoft Lync 2013 Service Pack 1
MS15-044 Microsoft Lync 2013 Service Pack 1
MS15-044 Microsoft Lync Basic 2013 Service Pack 1
MS15-044 Microsoft Lync Basic 2013 Service Pack 1
MS15-044 Microsoft Office 2007 Service Pack 3
MS15-044 Microsoft Office 2010 Service Pack 2
MS15-044 Microsoft Office 2010 Service Pack 2
MS15-044 Microsoft Silverlight 5
MS15-044 Microsoft Silverlight 5 Developer Runtime
MS15-044 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-044 Windows 7 for 32-bit Systems Service Pack 1
MS15-044 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-044 Windows 7 for x64-based Systems Service Pack 1
MS15-044 Windows 8 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-044 Windows 8 for 32-bit Systems
MS15-044 Windows 8 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-044 Windows 8 for x64-based Systems
MS15-044 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-044 Windows 8.1 for 32-bit Systems
MS15-044 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-044 Windows 8.1 for x64-based Systems
MS15-044 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-044 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 4)
MS15-044 Windows Server 2003 Service Pack 2
MS15-044 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-044 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-044 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-044 Windows Server 2003 x64 Edition Service Pack 2
MS15-044 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-044 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-044 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-044 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS15-044 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-044 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-044 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-044 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-044 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-044 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-044 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-044 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-044 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-044 Windows Server 2012(Microsoft .NET Framework 3.5)
MS15-044 Windows Server 2012
MS15-044 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-044 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS15-044 Windows Server 2012 R2
MS15-044 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-044 Windows Vista Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-044 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-044 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-044 Windows Vista Service Pack 2
MS15-044 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-044 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-044 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-044 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Journal Remote Code Execution Vulnerability (MS15-045)
- Severity
- Urgent 5
- Qualys ID
- 91054
- Vendor Reference
- MS15-045
- CVE Reference
- CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1697, CVE-2015-1698, CVE-2015-1699
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
The security update addresses the vulnerability by modifying the way that Windows Journal parses Journal files. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. The subsequent parsing of the file causes the Journal program to crash in a way that an attacker could execute arbitrary code.
This security update is rated Critical.
Affected Versions:
Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 - Consequence
- An attacker who successfully exploit this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Customers are advised to visit MS15-045 for further details.
Workaround:
- Do not open Windows Journal (.jnt) files that you receive from untrusted sources or that you receive unexpectedly from trusted sources.Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-045 Windows 7 for 32-bit Systems Service Pack 1
MS15-045 Windows 7 for x64-based Systems Service Pack 1
MS15-045 Windows 8 for 32-bit Systems
MS15-045 Windows 8 for x64-based Systems
MS15-045 Windows 8.1 for 32-bit Systems
MS15-045 Windows 8.1 for x64-based Systems
MS15-045 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-045 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-045 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-045 Windows Server 2012
MS15-045 Windows Server 2012 R2
MS15-045 Windows Vista Service Pack 2
MS15-045 Windows Vista x64 Edition Service Pack 2
-
Microsoft SharePoint Server Remote Code Execution Vulnerability (MS15-047)
- Severity
- Critical 4
- Qualys ID
- 110254
- Vendor Reference
- MS15-047
- CVE Reference
- CVE-2015-1700
- CVSS Scores
- Base 6 / Temporal 4.7
- Description
-
This security update resolves vulnerabilities in Microsoft Office server and productivity software.
The security update addresses the vulnerabilities by correcting how SharePoint Server sanitizes specially crafted page content.
This security update is rated Important for supported editions of Microsoft SharePoint Server 2007, Microsoft SharePoint Server 2010, Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Foundation 2013. - Consequence
- The vulnerabilities could allow remote code execution if authenticated attacker sends specially crafted page content to a SharePoint server. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the security context of the W3WP service account on the target SharePoint site.
- Solution
-
Refer to MS15-047 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-047 Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)
MS15-047 Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)
MS15-047 Microsoft SharePoint Server 2010 Service Pack 2(Microsoft SharePoint Foundation 2010 Service Pack 2)
MS15-047 Microsoft SharePoint Server 2010 Service Pack 2
MS15-047 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Foundation 2013 Service Pack 1)
-
Microsoft .NET Framework Elevation of Privilege and Denial Of Service Vulnerability (MS15-048)
- Severity
- Critical 4
- Qualys ID
- 91053
- Vendor Reference
- MS15-048
- CVE Reference
- CVE-2015-1672, CVE-2015-1673
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
The Microsoft .NET Framework is a software framework for computers running Microsoft Windows operating systems.
A denial of service vulnerability exists in Microsoft .NET Framework that could allow an unauthenticated attacker to degrade the performance of a .NET-enabled website and disrupt the availability of applications that use Microsoft .NET Framework. The vulnerability exists when Microsoft .NET Framework attempts to decrypt certain specially crafted XML data (CVE-2015-1672).
An elevation of privilege vulnerability exists in Microsoft .NET Framework that is caused when .NET's Windows Forms (WinForms) libraries improperly handle objects in memory (CVE-2015-1673).
This security update is rated Important for Microsoft .NET Framework 1.1 Service Pack 1, Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4, Microsoft .NET Framework 4.5, Microsoft .NET Framework 4.5.1, and Microsoft .NET Framework 4.5.2 on affected releases of Microsoft Windows.
- Consequence
- Successfully exploiting this vulnerabilities might allow an attacker to gain escalated privileges or cause denial-of-service like conditions.
- Solution
-
Refer to MS15-048 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-048 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 8 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8 for 32-bit Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 8 for 32-bit Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 8 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8 for x64-based Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 8 for x64-based Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-048 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 1.1 Service Pack 1)
MS15-048 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 4)
MS15-048 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 4)
MS15-048 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2012(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2012(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012 R2(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows Server 2012 R2(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-048 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-048 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-048 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-048 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-048 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
-
Microsoft Silverlight Elevation of Privilege Vulnerability (MS15-049)
- Severity
- Critical 4
- Qualys ID
- 91050
- Vendor Reference
- MS15-049
- CVE Reference
- CVE-2015-1715
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Silverlight is a cross-browser, cross-platform plug-in for delivering media experiences and rich interactive applications for the Web.
An elevation of privilege vulnerability exists in Microsoft Silverlight that is caused when Silverlight improperly allows applications that are intended to run at a low integrity level (very limited permissions) to be executed at a medium integrity level (permissions of the current user) or higher.
This security update is rated Important for Microsoft Silverlight 5 and Microsoft Silverlight 5 Developer Runtime when installed on Mac or all supported releases of Microsoft Windows
- Consequence
- Successfully exploiting this vulnerability might allow an attacker to gain escalated privileges.
- Solution
-
Refer to MS15-049 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-049 Microsoft Silverlight 5
MS15-049 Microsoft Silverlight 5
MS15-049 Microsoft Silverlight 5
MS15-049 Microsoft Silverlight 5 Developer Runtime
MS15-049 Microsoft Silverlight 5 Developer Runtime
MS15-049 Microsoft Silverlight 5 Developer Runtime
-
Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerabilities (MS15-051)
- Severity
- Critical 4
- Qualys ID
- 91049
- Vendor Reference
- MS15-051
- CVE Reference
- CVE-2015-1676, CVE-2015-1677, CVE-2015-1678, CVE-2015-1679, CVE-2015-1680, CVE-2015-1701
- CVSS Scores
- Base 7.2 / Temporal 6.3
- Description
-
Information disclosure vulnerabilities exist when the Windows kernel-mode driver leaks private address information during a function call, which can allow the disclosure of kernel memory contents revealing information about the system to an attacker. (CVE-2015-1676,CVE-2015-1677,CVE-2015-1678,CVE-2015-1679,CVE-2015-1680)
An elevation of privilege vulnerability exists when Windows kernel-mode drivers improperly handle objects in memory. (CVE-2015-1701)
Windows Server 2003 Service Pack 2
Windows Server 2003 R2 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 R2 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- An attacker who successfully exploits this vulnerability can run arbitrary code in kernel mode.
- Solution
-
Refer to MS15-051 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-051 Windows 7 for 32-bit Systems Service Pack 1
MS15-051 Windows 7 for x64-based Systems Service Pack 1
MS15-051 Windows 8 for 32-bit Systems
MS15-051 Windows 8 for x64-based Systems
MS15-051 Windows 8.1 for 32-bit Systems
MS15-051 Windows 8.1 for x64-based Systems
MS15-051 Windows Server 2003 Service Pack 2
MS15-051 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-051 Windows Server 2003 x64 Edition Service Pack 2
MS15-051 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-051 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-051 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-051 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-051 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-051 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-051 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-051 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-051 Windows Server 2012
MS15-051 Windows Server 2012
MS15-051 Windows Server 2012 R2
MS15-051 Windows Server 2012 R2
MS15-051 Windows Vista Service Pack 2
MS15-051 Windows Vista x64 Edition Service Pack 2
-
Microsoft Schannel Information Disclosure Vulnerability (MS15-055)
- Severity
- Critical 4
- Qualys ID
- 91052
- Vendor Reference
- MS15-055
- CVE Reference
- CVE-2015-1716
- CVSS Scores
- Base 5 / Temporal 3.7
- Description
-
An information disclosure vulnerability exists in Secure Channel (Schannel) when it allows the use of a weak Diffie-Hellman ephemeral (DFE) key length of 512 bits in an encrypted TLS session. (CVE-2015-1716)
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- Successful exploitation allows an attacker to disclose sensitive information.
- Solution
-
Please refer to MS15-055 for details.
Workaround:
Disable DHE cipher suitesPatches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-055 Windows 7 for 32-bit Systems Service Pack 1
MS15-055 Windows 7 for x64-based Systems Service Pack 1
MS15-055 Windows 8 for 32-bit Systems
MS15-055 Windows 8 for x64-based Systems
MS15-055 Windows 8.1 for 32-bit Systems
MS15-055 Windows 8.1 for x64-based Systems
MS15-055 Windows Server 2003 Service Pack 2
MS15-055 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-055 Windows Server 2003 x64 Edition Service Pack 2
MS15-055 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-055 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-055 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-055 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-055 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-055 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-055 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-055 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-055 Windows Server 2012
MS15-055 Windows Server 2012
MS15-055 Windows Server 2012 R2
MS15-055 Windows Server 2012 R2
MS15-055 Windows Vista Service Pack 2
MS15-055 Windows Vista x64 Edition Service Pack 2
These new vulnerability checks are included in Qualys vulnerability signature 2.3.10-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 110255
- 91058
- 91055
- 91051
- 100232
- 91048
- 91056
- 91054
- 110254
- 91053
- 91050
- 91049
- 91052
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.