Microsoft security alert.
June 9, 2015
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 45 vulnerabilities that were fixed in 8 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 8 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Office Remote Code Execution Vulnerability (MS15-059)
- Severity
- Critical 4
- Qualys ID
- 110256
- Vendor Reference
- MS15-059
- CVE Reference
- CVE-2015-1759, CVE-2015-1760, CVE-2015-1770
- CVSS Scores
- Base 9.3 / Temporal 8.1
- Description
-
Microsoft Office is exposed to a remote code execution vulnerability. This vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory (CVE-2015-1770).
This security update is rated Important for all supported editions of Microsoft Office 2007,Microsoft Office 2010,Microsoft Office 2013,Microsoft Office 2013 RT.
- Consequence
- Successfully exploiting this vulnerability might allow an attacker to execute arbitrary commands on vulnerable targets.
- Solution
-
Please refer to MS15-059 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-059 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-059 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS15-059 Microsoft Office Compatibility Pack Service Pack 3
-
Microsoft Internet Explorer Cumulative Security Update (MS15-056)
- Severity
- Urgent 5
- Qualys ID
- 100237
- Vendor Reference
- MS15-056
- CVE Reference
- CVE-2015-1687, CVE-2015-1730, CVE-2015-1731, CVE-2015-1732, CVE-2015-1735, CVE-2015-1736, CVE-2015-1737, CVE-2015-1739, CVE-2015-1740, CVE-2015-1741, CVE-2015-1742, CVE-2015-1743, CVE-2015-1744, CVE-2015-1745, CVE-2015-1747, CVE-2015-1748, CVE-2015-1750, CVE-2015-1751, CVE-2015-1752, CVE-2015-1753, CVE-2015-1754, CVE-2015-1755, CVE-2015-1765, CVE-2015-1766
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves vulnerabilities in Internet Explorer.
- An information disclosure vulnerability exists in Internet Explorer that could allow an attacker who successfully exploits this vulnerability to gain access to a users browser history.
- Elevation of privilege vulnerabilities exist when Internet Explorer does not properly validate permissions under specific conditions, potentially allowing scripts to be run with elevated privileges.
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
- Consequence
- Successful exploitation allows an attacker to execute arbitrary code.
- Solution
-
Refer to Microsoft Security Bulletin MS15-056 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-056 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-056 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-056 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-056 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-056 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS15-056 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS15-056 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS15-056 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS15-056 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-056 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-056 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-056 Windows Server 2012(Internet Explorer 10)
MS15-056 Windows Server 2012 R2(Internet Explorer 11)
MS15-056 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-056 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-056 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-056 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-056 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-056 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Windows Media Player Remote Code Execution (MS15-057)
- Severity
- Urgent 5
- Qualys ID
- 115229
- Vendor Reference
- MS15-057
- CVE Reference
- CVE-2015-1728
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Windows Media Player is a video and audio file player for Windows-based systems. It supports multiple file formats and allows playing files from either the local file system or the network.
A remote code execution vulnerability exists in the way that Windows Media Player handles specially crafted DataObjects. The security update addresses the vulnerability by correcting how Windows Media Player handles DataObjects.
This security update is rated Critical for Windows Media Player 10 when installed on Windows Server 2003, Windows Media Player 11 when installed on Windows Vista or Windows Server 2008, and Windows Media Player 12 when installed on Windows 7 or Windows Server 2008 R2.
- Consequence
- The vulnerability can be exploited to execute arbitrary code with the privileges of the current user.
- Solution
-
Please refer to MS15-057 for more details.
Workaround:
- Remove wmplayer.exe from the Internet Explorer ElevationPolicyPatches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-057 Windows 7 for 32-bit Systems Service Pack 1(Windows Media Player 12)
MS15-057 Windows 7 for x64-based Systems Service Pack 1(Windows Media Player 12)
MS15-057 Windows Server 2003 Service Pack 2(Windows Media Player 10)
MS15-057 Windows Server 2003 x64 Edition Service Pack 2(Windows Media Player 10)
MS15-057 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Windows Media Player 12)
MS15-057 Windows Server 2008 for 32-bit Systems Service Pack 2(Windows Media Player 11)
MS15-057 Windows Server 2008 for x64-based Systems Service Pack 2(Windows Media Player 11)
MS15-057 Windows Vista Service Pack 2(Windows Media Player 11)
MS15-057 Windows Vista x64 Edition Service Pack 2(Windows Media Player 11)
-
Microsoft Windows Common Controls Remote Code Execution Vulnerability (MS15-060)
- Severity
- Critical 4
- Qualys ID
- 91060
- Vendor Reference
- MS15-060
- CVE Reference
- CVE-2015-1756
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user clicks a specially crafted link, or a link to specially crafted content, and then invokes F12 Developer Tools in Internet Explorer.
The security update addresses the vulnerability by correcting how Windows handles objects in memory.
Affected Versions:
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. - Consequence
- The vulnerability can be exploited to execute arbitrary code with the privileges of the current user.
- Solution
-
Please refer to MS15-060 for more details.
Workaround:
Disable Internet Explorer Developer Tools via the System Registry
To disable Internet Explorer Developer tools, create and run the following managed script:
1. Save the following to a file with a .reg extension (e.g., Disable_IEDevTools.reg):
Windows Registry Editor Version 5.00
HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\IEDevTools]
"Disabled"=dword:000000012. Run the above registry script on the target machine with the following command:
Regedit.exe /s Disable_IEDevTools.regPatches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-060 Windows 7 for 32-bit Systems Service Pack 1
MS15-060 Windows 7 for x64-based Systems Service Pack 1
MS15-060 Windows 8 for 32-bit Systems
MS15-060 Windows 8 for x64-based Systems
MS15-060 Windows 8.1 for 32-bit Systems
MS15-060 Windows 8.1 for x64-based Systems
MS15-060 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-060 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-060 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-060 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-060 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-060 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-060 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-060 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-060 Windows Server 2012
MS15-060 Windows Server 2012
MS15-060 Windows Server 2012 R2
MS15-060 Windows Server 2012 R2
MS15-060 Windows Vista Service Pack 2
MS15-060 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Kernel-Mode Driver Privilege Escalation Vulnerability (MS15-061)
- Severity
- Critical 4
- Qualys ID
- 91059
- Vendor Reference
- MS15-061
- CVE Reference
- CVE-2015-1719, CVE-2015-1720, CVE-2015-1721, CVE-2015-1722, CVE-2015-1723, CVE-2015-1724, CVE-2015-1725, CVE-2015-1726, CVE-2015-1727, CVE-2015-1768, CVE-2015-2360
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
This security update resolves vulnerabilities in Microsoft Windows. The security update addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory and validates user input.
This security update is rated Important for all supported releases of Windows.
Note: Windows XP is end of life and is vulnerable to this issue. For further details see Exploits Against Obsolete Software.
- Consequence
- The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Solution
-
Please refer to MS15-061 for more details.
Workaround:
Disable NULL page mapping on Windows 7
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-061 Windows 7 for 32-bit Systems Service Pack 1
MS15-061 Windows 7 for x64-based Systems Service Pack 1
MS15-061 Windows 8 for 32-bit Systems
MS15-061 Windows 8 for x64-based Systems
MS15-061 Windows 8.1 for 32-bit Systems
MS15-061 Windows 8.1 for x64-based Systems
MS15-061 Windows Server 2003 R2 Service Pack 2
MS15-061 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-061 Windows Server 2003 Service Pack 2
MS15-061 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-061 Windows Server 2003 x64 Edition Service Pack 2
MS15-061 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-061 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-061 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-061 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-061 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-061 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-061 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-061 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-061 Windows Server 2012
MS15-061 Windows Server 2012
MS15-061 Windows Server 2012 R2
MS15-061 Windows Server 2012 R2
MS15-061 Windows Vista Service Pack 2
MS15-061 Windows Vista x64 Edition Service Pack 2
-
Microsoft Active Directory Federation Services Privilege Escalation Vulnerability (MS15-062)
- Severity
- Critical 4
- Qualys ID
- 90052
- Vendor Reference
- MS15-062
- CVE Reference
- CVE-2015-1757
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
-
The security update addresses the vulnerability by correcting how AD FS handles the HTML encoding of HTTP responses.
This security update is rated Important for Active Directory Federation Services 2.0 and Active Directory Federation Services 2.1.
Affected Software:
AD FS 2.0 when installed on 32-bit and x64-based editions of Windows Server 2008
AD FS 2.0 when installed on x64-based editions of Windows Server 2008 R2
AD FS 2.1 when installed on x64-based editions of Windows Server 2012
- Consequence
-
The vulnerability could allow elevation of privilege if an attacker submits a specially crafted URL to a target site. Due to the vulnerability, in specific situations a specially crafted script is not properly sanitized, which could subsequently lead to an attacker-supplied script being run in the security context of a user who views the malicious content.
- Solution
-
Please refer to Microsoft Security Bulletin MS15-062 for further details.
Workaround:
Use a web application firewall to block suspicious requests.
Use a web application firewall (WAF) to block requests to /adfs/ls where the query parameter "wct" contains HTML markup or javascript code.Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-062 Windows Server 2008(Active Directory Federation Services 2.0)
MS15-062 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Active Directory Federation Services 2.0)
MS15-062 Windows Server 2008 for x64-based Systems Service Pack 2(Active Directory Federation Services 2.0)
-
Microsoft Windows Kernel Elevation of Privilege Vulnerability (MS15-063)
- Severity
- Critical 4
- Qualys ID
- 90047
- Vendor Reference
- MS15-063
- CVE Reference
- CVE-2015-1758
- CVSS Scores
- Base 6.9 / Temporal 5.1
- Description
-
The Windows kernel is the core of the operating system. The kernel provides system-level services such as device management and memory management, allocates processor time to processes and manages error handling.
An elevation of privilege vulnerability exists in Microsoft Windows LoadLibrary when it fails to properly validate user input. The update addresses the vulnerability by correcting how Windows validates user input.
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT.
- Consequence
-
An authenticated attacker who successfully exploits this vulnerability could elevate privileges on a targeted system.
- Solution
-
Please refer to MS15-063 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-063 Windows 8
MS15-063 Windows 8 for x64-based Systems
MS15-063 Windows 8.1
MS15-063 Windows 8.1 for x64-based Systems
MS15-063 Windows Server 2003
MS15-063 Windows Server 2003 for Itanium-based Systems
MS15-063 Windows Server 2003 x64 Edition
MS15-063 Windows Server 2012
MS15-063 Windows Server 2012 R2
MS15-063 Windows Vista
MS15-063 Windows Vista for x64-based Systems
MS15-063 Windows XP
MS15-063 Windows XP x64 Edition
-
Microsoft Exchange Server Multiple Vulnerabilities (MS15-064)
- Severity
- Critical 4
- Qualys ID
- 53000
- Vendor Reference
- MS15-064
- CVE Reference
- CVE-2015-1764, CVE-2015-1771, CVE-2015-2359
- CVSS Scores
- Base 6.8 / Temporal 5
- Description
-
Microsoft Exchange Server is prone to the following vulnerabilities:
- An information disclosure vulnerability exists in Microsoft Exchange web applications when Exchange does not properly manage same-origin policy.
- An elevation of privilege vulnerability exists in Microsoft Exchange web applications when Exchange does not properly manage user sessions.
- An information disclosure vulnerability exists in Microsoft Exchange web applications when Exchange does not properly sanitize HTML strings.
Microsoft has released a security update that addresses the vulnerabilities by modifying how Exchange web applications manage same-origin policy, by modifying how Exchange web applications manage user session authentication and by correcting how Exchange web applications sanitize HTML strings.
The security update is rated Important for all supported editions of Microsoft Exchange Server 2013.
- Consequence
- The most severe of the vulnerabilities could allow elevation of privilege if an authenticated user clicks a link to a specially crafted webpage. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or Instant Messenger message.
- Solution
-
Please refer to MS15-064 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-064 Microsoft Exchange Server 2013 Cumulative Update 8
MS15-064 Microsoft Exchange Server 2013 Service Pack 1
These new vulnerability checks are included in Qualys vulnerability signature 2.3.36-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 110256
- 100237
- 115229
- 91060
- 91059
- 90052
- 90047
- 53000
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.