Microsoft security alert.
July 14, 2015
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 58 vulnerabilities that were fixed in 14 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 14 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Windows Remote Code Execution Vulnerability (MS15-069)
- Severity
- Urgent 5
- Qualys ID
- 91064
- Vendor Reference
- MS15-069
- CVE Reference
- CVE-2015-2368, CVE-2015-2369
- CVSS Scores
- Base 6.9 / Temporal 5.7
- Description
-
A remote code execution vulnerability exists when Microsoft Windows improperly handles the loading of dynamic link library (DLL) files. (CVE-2015-2368)
A remote code execution vulnerability exists when Microsoft Windows Media Device Manager improperly handles the loading of certain specially crafted DLL files. (CVE-2015-2369)
This security update is rated Important.
- Consequence
- Successfully exploiting this vulnerability might allow a remote attacker to run arbitrary code on the affected system.
- Solution
-
Please refer to MS15-069 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-069 Windows 7 for 32-bit Systems Service Pack 1
MS15-069 Windows 7 for 32-bit Systems Service Pack 1
MS15-069 Windows 7 for x64-based Systems Service Pack 1
MS15-069 Windows 7 for x64-based Systems Service Pack 1
MS15-069 Windows 8.1 for 32-bit Systems
MS15-069 Windows 8.1 for x64-based Systems
MS15-069 Windows Server 2003 Service Pack 2
MS15-069 Windows Server 2003 x64 Edition Service Pack 2
MS15-069 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-069 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-069 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-069 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-069 Windows Server 2012 R2
MS15-069 Windows Vista Service Pack 2
MS15-069 Windows Vista x64 Edition Service Pack 2
-
Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
- Severity
- Urgent 5
- Qualys ID
- 91070
- Vendor Reference
- MS15-072
- CVE Reference
- CVE-2015-2364
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
An elevation of privilege vulnerability exists in the Windows graphics component when it fails to properly process bitmap conversions.
The security update addresses the vulnerability by correcting how Windows processes bitmap conversions.
This security update is rated Important for all supported releases of Windows.
- Consequence
- The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An authenticated attacker who successfully exploits this vulnerability could elevate privileges on a targeted system.
- Solution
-
Refer to MS15-072 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-072 Windows 7 for 32-bit Systems Service Pack 1
MS15-072 Windows 7 for x64-based Systems Service Pack 1
MS15-072 Windows 8 for 32-bit Systems
MS15-072 Windows 8 for x64-based Systems
MS15-072 Windows 8.1 for 32-bit Systems
MS15-072 Windows 8.1 for x64-based Systems
MS15-072 Windows Server 2003 R2 Service Pack 2
MS15-072 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-072 Windows Server 2003 Service Pack 2
MS15-072 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-072 Windows Server 2003 x64 Edition Service Pack 2
MS15-072 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-072 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-072 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-072 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-072 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-072 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-072 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-072 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-072 Windows Server 2012
MS15-072 Windows Server 2012
MS15-072 Windows Server 2012 R2
MS15-072 Windows Server 2012 R2
MS15-072 Windows Vista Service Pack 2
MS15-072 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Remote Desktop Remote Code Execution Vulnerability (MS15-067)
- Severity
- Urgent 5
- Qualys ID
- 91068
- Vendor Reference
- MS15-067
- CVE Reference
- CVE-2015-2373
- CVSS Scores
- Base 10 / Temporal 7.4
- Description
-
Remote Desktop Protocol (RDP) lets users create a virtual session on their desktop computers. RDP allows remote users to access all of the data and applications on their computer system.
A remote code execution vulnerability exists in how the Remote Desktop Protocol (RDP) (terminal) service handles crafted packets.
This security update is rated Critical for all supported editions of Windows 7 and Windows 8.
- Consequence
- The vulnerability can be exploited to execute arbitrary code with the privileges of the current user.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS15-067 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-067 Windows 7 for 32-bit Systems Service Pack 1
MS15-067 Windows 7 for 32-bit Systems Service Pack 1
MS15-067 Windows 7 for x64-based Systems Service Pack 1
MS15-067 Windows 7 for x64-based Systems Service Pack 1
MS15-067 Windows 8 for 32-bit Systems
MS15-067 Windows 8 for x64-based Systems
MS15-067 Windows Server 2012
MS15-067 Windows Server 2012
-
Microsoft Hyper-V Remote Code Execution Vulnerabilities (MS15-068)
- Severity
- Serious 3
- Qualys ID
- 91072
- Vendor Reference
- MS15-068
- CVE Reference
- CVE-2015-2361, CVE-2015-2362
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
Hyper-V is a hypervisor-based technology that is a key feature of Windows Server 2008 and Windows Server 2008 R2.
This security update resolves vulnerabilities in Windows Hyper-V. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V.
This security update is rated Critical for Windows Hyper-V on Windows Server 2008, Windows Server 2008 R2, Windows 8 and Windows Server 2012, and Windows 8.1 and Windows Server 2012 R2.
- Consequence
- These vulnerabilities can be exploited by malicious users to execute arbitrary code with the privileges of the current user.
- Solution
-
Refer to Microsoft Security Bulletin MS15-068 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-068 Windows 8 for x64-based Systems
MS15-068 Windows 8.1 for x64-based Systems
MS15-068 Windows 8.1 for x64-based Systems
MS15-068 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-068 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-068 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-068 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-068 Windows Server 2012
MS15-068 Windows Server 2012
MS15-068 Windows Server 2012 R2
MS15-068 Windows Server 2012 R2
MS15-068 Windows Server 2012 R2
MS15-068 Windows Server 2012 R2
-
Microsoft Windows Netlogon Spoofing Vulnerability (MS15-071)
- Severity
- Critical 4
- Qualys ID
- 91069
- Vendor Reference
- MS15-071
- CVE Reference
- CVE-2015-2374
- CVSS Scores
- Base 3.3 / Temporal 2.4
- Description
-
A spoofing vulnerability exists in Netlogon that is caused when the Netlogon service improperly establishes a secure communications channel belonging to a different machine with a spoofed computer name.
The update addresses the vulnerability by modifying how Netlogon handles establishing secure channels.
This security update is rated Important for all supported editions of Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2
- Consequence
- The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system.
- Solution
-
Refer to Microsoft Security Bulletin MS15-071 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-071 Windows Server 2003 R2 Service Pack 2
MS15-071 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-071 Windows Server 2003 Service Pack 2
MS15-071 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-071 Windows Server 2003 x64 Edition Service Pack 2
MS15-071 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-071 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-071 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-071 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-071 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-071 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-071 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-071 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-071 Windows Server 2012
MS15-071 Windows Server 2012
MS15-071 Windows Server 2012 R2
MS15-071 Windows Server 2012 R2
-
Microsoft SQL Server Remote Code Execution Vulnerability (MS15-058)
- Severity
- Critical 4
- Qualys ID
- 19983
- Vendor Reference
- MS15-058
- CVE Reference
- CVE-2015-1761, CVE-2015-1762, CVE-2015-1763
- CVSS Scores
- Base 8.5 / Temporal 6.7
- Description
-
An elevation of privilege vulnerability exists in Microsoft SQL Server when it improperly casts pointers to an incorrect class. An attacker could exploit the vulnerability if their credentials allow access to an affected SQL server database (CVE-2015-1761).
A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles internal function calls to uninitialized memory (CVE-2015-1762).
An authenticated remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles internal function calls to uninitialized memory (CVE-2015-1763).
This security update is rated Important for supported editions of Microsoft SQL Server 2008, Microsoft SQL Server 2008 R2, Microsoft SQL Server 2012, and Microsoft SQL Server 2014.
Note: Microsoft SQL Server 2014 Service Pack 1 is not affected by the vulnerabilities that are discussed under MS15-058.
Source:KB3070446 - Consequence
- Successfully exploiting these vulnerabilities might allow an attacker to execute arbitrary code.
- Solution
-
Refer to Microsoft Security Bulletin MS15-058 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-058 Microsoft SQL Server 2008 for 32-bit Systems Service Pack 2
MS15-058 Microsoft SQL Server 2008 for 32-bit Systems Service Pack 2
MS15-058 Microsoft SQL Server 2008 for 32-bit Systems Service Pack 4
MS15-058 Microsoft SQL Server 2008 for 32-bit Systems Service Pack 3
MS15-058 Microsoft SQL Server 2008 for 64-bit Systems Service Pack 2
MS15-058 Microsoft SQL Server 2008 for 64-bit Systems Service Pack 3
MS15-058 Microsoft SQL Server 2008 for 64-bit Systems Service Pack 4
MS15-058 Microsoft SQL Server 2008 for 64-bit Systems Service Pack 3
MS15-058 Microsoft SQL Server 2012 for 32-bit Systems Service Pack 1
MS15-058 Microsoft SQL Server 2012 for 32-bit Systems Service Pack 2
MS15-058 Microsoft SQL Server 2012 for 64-bit Systems Service Pack 1
MS15-058 Microsoft SQL Server 2012 for 64-bit Systems Service Pack 2
MS15-058 Microsoft SQL Server 2014 for 32-bit Systems
MS15-058 Microsoft SQL Server 2014 for 64-bit Systems
-
Microsoft Internet Explorer Cumulative Security Update (MS15-065)
- Severity
- Urgent 5
- Qualys ID
- 100244
- Vendor Reference
- MS15-065
- CVE Reference
- CVE-2015-1729, CVE-2015-1733, CVE-2015-1738, CVE-2015-1767, CVE-2015-2372, CVE-2015-2383, CVE-2015-2384, CVE-2015-2385, CVE-2015-2388, CVE-2015-2389, CVE-2015-2390, CVE-2015-2391, CVE-2015-2397, CVE-2015-2398, CVE-2015-2401, CVE-2015-2402, CVE-2015-2403, CVE-2015-2404, CVE-2015-2406, CVE-2015-2408, CVE-2015-2410, CVE-2015-2411, CVE-2015-2412, CVE-2015-2413, CVE-2015-2414, CVE-2015-2419, CVE-2015-2421, CVE-2015-2422, CVE-2015-2425
- CVSS Scores
- Base 9.3 / Temporal 8.1
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
- Consequence
- Successful exploitation allows an attacker to execute arbitrary code.
- Solution
-
Refer to Microsoft Security Bulletin MS15-065 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-065 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-065 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-065 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-065 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-065 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-065 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-065 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-065 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-065 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-065 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-065 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-065 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-065 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS15-065 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS15-065 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS15-065 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS15-065 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS15-065 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS15-065 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS15-065 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS15-065 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-065 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-065 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-065 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-065 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-065 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-065 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-065 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-065 Windows Server 2012(Internet Explorer 10)
MS15-065 Windows Server 2012 R2(Internet Explorer 11)
MS15-065 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-065 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-065 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-065 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-065 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-065 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft VBScript Engine Remote Code Execution Vulnerability (MS15-066)
- Severity
- Critical 4
- Qualys ID
- 91063
- Vendor Reference
- MS15-066
- CVE Reference
- CVE-2015-2372
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
A remote code execution vulnerability exists in the way that the VBScript engine, when rendered in Internet Explorer, handles objects in memory (CVE-2015-2372).
This security update is rated Critical for affected versions of the VBScript scripting engine on affected Windows clients and Moderate for affected versions of the VBScript scripting engine on affected Windows servers.
- Consequence
- Successfully exploiting this vulnerability might allow a remote attacker to run arbitrary code on the affected system.
- Solution
-
Please refer to MS15-066 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-066 Windows Server 2003 Service Pack 2(VBScript 5.6)
MS15-066 Windows Server 2003 Service Pack 2(VBScript 5.7)
MS15-066 Windows Server 2003 with SP2 for Itanium-based Systems(VBScript 5.6)
MS15-066 Windows Server 2003 with SP2 for Itanium-based Systems(VBScript 5.7)
MS15-066 Windows Server 2003 x64 Edition Service Pack 2(VBScript 5.6)
MS15-066 Windows Server 2003 x64 Edition Service Pack 2(VBScript 5.7)
MS15-066 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(VBScript 5.8)
MS15-066 Windows Server 2008 for 32-bit Systems Service Pack 2(VBScript 5.7)
MS15-066 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS15-066 Windows Server 2008 for Itanium-based Systems Service Pack 2(VBScript 5.7)
MS15-066 Windows Server 2008 for x64-based Systems Service Pack 2(VBScript 5.7)
MS15-066 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS15-066 Windows Vista Service Pack 2(VBScript 5.7)
MS15-066 Windows Vista x64 Edition Service Pack 2(VBScript 5.7)
-
Microsoft Office Multiple Remote Code Execution Vulnerabilities (MS15-070)
- Severity
- Critical 4
- Qualys ID
- 110257
- Vendor Reference
- MS15-070
- CVE Reference
- CVE-2015-2375, CVE-2015-2376, CVE-2015-2377, CVE-2015-2378, CVE-2015-2379, CVE-2015-2380, CVE-2015-2415, CVE-2015-2424
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Office is prone to the following vulnerabilities:
A remote code execution vulnerability exists when Microsoft Excel improperly handles the loading of dynamic link library (DLL) files.
A security feature bypass vulnerability exists in Microsoft Excel when memory is released in an unintended manner. The vulnerability could allow an attacker to bypass the Address Space Layout Randomization (ASLR) security feature.
Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.
Microsoft has released an update that addresses these vulnerabilities by correcting how Office handles files in memory, by correcting how Excel handles the loading of certain specially crafted binaries, and by correcting how memory information is disclosed.
This security update is rated Important.
- Consequence
- Successfully exploiting these vulnerabilities might allow a remote attacker to execute arbitrary code or gain escalated privileges.
- Solution
-
Refer to MS15-070 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-070 Microsoft Excel Viewer 2007 Service Pack 3(Microsoft Excel Viewer 2007 Service Pack 3)
MS15-070 Microsoft Office 2007 Service Pack 3(Microsoft Excel 2007 Service Pack 3)
MS15-070 Microsoft Office 2007 Service Pack 3(Microsoft Word 2007 Service Pack 3)
MS15-070 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Excel 2010 Service Pack 2 (32-bit editions))
MS15-070 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Office 2010 Service Pack 2 (32-bit editions))
MS15-070 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Word 2010 Service Pack 2 (32-bit editions))
MS15-070 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Excel 2010 Service Pack 2 (64-bit editions))
MS15-070 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Office 2010 Service Pack 2 (64-bit editions))
MS15-070 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Word 2010 Service Pack 2 (64-bit editions))
MS15-070 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Excel 2013 Service Pack 1 (32-bit editions))
MS15-070 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Word 2013 Service Pack 1 (32-bit editions))
MS15-070 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Excel 2013 Service Pack 1 (64-bit editions))
MS15-070 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Word 2013 Service Pack 1 (64-bit editions))
MS15-070 Microsoft Office Compatibility Pack Service Pack 3(Microsoft Office Compatibility Pack Service Pack 3)
MS15-070 Microsoft Office for Mac 2011(Microsoft Excel for Mac 2011)
MS15-070 Microsoft PowerPoint 2007 Service Pack 3(Microsoft PowerPoint 2007 Service Pack 3)
MS15-070 Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)(Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions))
MS15-070 Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)(Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions))
MS15-070 Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)(Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions))
MS15-070 Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)(Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions))
MS15-070 Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)(Excel Services)
MS15-070 Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)(Excel Services)
MS15-070 Microsoft SharePoint Server 2010 Service Pack 2(Excel Services)
MS15-070 Microsoft SharePoint Server 2013 Service Pack 1(Excel Services)
MS15-070 Microsoft Word Viewer(Microsoft Word Viewer)
-
Microsoft Windows Kernel-Mode Driver Elevation of Privilege Vulnerabilities (MS15-073)
- Severity
- Critical 4
- Qualys ID
- 91065
- Vendor Reference
- MS15-073
- CVE Reference
- CVE-2015-2363, CVE-2015-2365, CVE-2015-2366, CVE-2015-2367, CVE-2015-2381, CVE-2015-2382
- CVSS Scores
- Base 7.2 / Temporal 5.6
- Description
-
Microsoft Windows Kernel is prone to the following vulnerabilities:
Multiple elevation of privilege vulnerabilities exists due to the way the Windows kernel-mode driver handles objects in memory.
An information disclosure vulnerability exists when the Windows kernel-mode driver improperly handles certain non-initialized values in memory.
An information disclosure vulnerability exists in the Windows kernel-mode driver that could allow the disclosure of kernel memory contents to an attacker.
Microsoft has released a security update that addresses these vulnerabilities by correcting how the Windows Kernel-mode driver handles objects in memory.
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.
- Solution
-
Rrefer to MS15-073 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-073 Windows 7 for 32-bit Systems Service Pack 1
MS15-073 Windows 7 for x64-based Systems Service Pack 1
MS15-073 Windows 8 for 32-bit Systems
MS15-073 Windows 8 for x64-based Systems
MS15-073 Windows 8.1 for 32-bit Systems
MS15-073 Windows 8.1 for x64-based Systems
MS15-073 Windows Server 2003 R2 Service Pack 2
MS15-073 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-073 Windows Server 2003 Service Pack 2
MS15-073 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-073 Windows Server 2003 x64 Edition Service Pack 2
MS15-073 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-073 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-073 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-073 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-073 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-073 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-073 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-073 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-073 Windows Server 2012
MS15-073 Windows Server 2012
MS15-073 Windows Server 2012 R2
MS15-073 Windows Server 2012 R2
MS15-073 Windows Vista Service Pack 2
MS15-073 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Installer Service Privilege Escalation Vulnerability (MS15-074)
- Severity
- Critical 4
- Qualys ID
- 91067
- Vendor Reference
- MS15-074
- CVE Reference
- CVE-2015-2371
- CVSS Scores
- Base 6.9 / Temporal 5.1
- Description
-
The Microsoft Windows Installer is an installation and configuration service provided with Windows. The installer service enables customers to provide better corporate deployment and provides a standard format for component management.
The security update addresses the vulnerability by correcting how custom action scripts are executed.
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- If this vulnerability is successfully exploited, attackers can run arbitrary code with full administrative rights.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS15-074 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-074 Windows 7 for 32-bit Systems Service Pack 1
MS15-074 Windows 7 for x64-based Systems Service Pack 1
MS15-074 Windows 8 for 32-bit Systems
MS15-074 Windows 8 for x64-based Systems
MS15-074 Windows 8.1 for 32-bit Systems
MS15-074 Windows 8.1 for x64-based Systems
MS15-074 Windows Server 2003 R2 Service Pack 2
MS15-074 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-074 Windows Server 2003 Service Pack 2
MS15-074 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-074 Windows Server 2003 x64 Edition Service Pack 2
MS15-074 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-074 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-074 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-074 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-074 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-074 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-074 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-074 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-074 Windows Server 2012
MS15-074 Windows Server 2012
MS15-074 Windows Server 2012 R2
MS15-074 Windows Server 2012 R2
MS15-074 Windows Vista Service Pack 2
MS15-074 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows OLE Elevation of Privilege Vulnerabilities (MS15-075)
- Severity
- Critical 4
- Qualys ID
- 91071
- Vendor Reference
- MS15-075
- CVE Reference
- CVE-2015-2416, CVE-2015-2417
- CVSS Scores
- Base 5 / Temporal 3.7
- Description
-
OLE (Object Linking and Embedding) is a technology that allows applications to share data and functionality, such as the ability to create and edit compound data. Compound data is data that contains information in multiple formats.
Elevation of privilege vulnerabilities exists when OLE objects are improperly handled in memory.
The security update addresses the vulnerabilities by modifying how OLE objects are handled in memory.
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- These vulnerabilities can be exploited by malicious users to install programs; view, change, or delete data; or create new accounts with full administrative rights.
- Solution
-
Refer to MS15-075 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-075 Windows 7 for 32-bit Systems Service Pack 1
MS15-075 Windows 7 for x64-based Systems Service Pack 1
MS15-075 Windows 8 for 32-bit Systems
MS15-075 Windows 8 for x64-based Systems
MS15-075 Windows 8.1 for 32-bit Systems
MS15-075 Windows 8.1 for x64-based Systems
MS15-075 Windows Server 2003 Service Pack 2
MS15-075 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-075 Windows Server 2003 x64 Edition Service Pack 2
MS15-075 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-075 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-075 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-075 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-075 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-075 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-075 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-075 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-075 Windows Server 2012
MS15-075 Windows Server 2012
MS15-075 Windows Server 2012 R2
MS15-075 Windows Server 2012 R2
MS15-075 Windows Vista Service Pack 2
MS15-075 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Remote Procedure Call Elevation of Privilege Vulnerability (MS15-076)
- Severity
- Serious 3
- Qualys ID
- 91073
- Vendor Reference
- MS15-076
- CVE Reference
- CVE-2015-2370
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
An elevation of privilege vulnerability exists in the Microsoft Remote Procedure Call (RPC) that could allow an attacker to elevate privileges on a targeted system. The vulnerability is caused when Windows RPC inadvertently allows DCE/RPC connection reflection (CVE-2015-2370).
This security update is rated Important for all supported releases of Windows.
- Consequence
- Successfully exploiting this vulnerability might allow an attacker to execute arbitrary commands on the system.
- Solution
-
Refer to Microsoft Security Bulletin MS15-076 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-076 Windows 7 for 32-bit Systems Service Pack 1
MS15-076 Windows 7 for x64-based Systems Service Pack 1
MS15-076 Windows 8 for 32-bit Systems
MS15-076 Windows 8 for x64-based Systems
MS15-076 Windows 8.1 for 32-bit Systems
MS15-076 Windows 8.1 for x64-based Systems
MS15-076 Windows Server 2003 R2 Service Pack 2
MS15-076 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-076 Windows Server 2003 Service Pack 2
MS15-076 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-076 Windows Server 2003 x64 Edition Service Pack 2
MS15-076 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-076 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-076 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-076 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-076 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-076 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-076 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-076 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-076 Windows Server 2012
MS15-076 Windows Server 2012
MS15-076 Windows Server 2012 R2
MS15-076 Windows Server 2012 R2
MS15-076 Windows Vista Service Pack 2
MS15-076 Windows Vista x64 Edition Service Pack 2
-
Microsoft ATM Font Driver Elevation of Privilege Vulnerability (MS15-077)
- Severity
- Critical 4
- Qualys ID
- 91066
- Vendor Reference
- MS15-077
- CVE Reference
- CVE-2015-2387
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
An elevation of privilege vulnerability exists in Adobe Type Manager Font Driver (ATMFD) when it fails to properly handle objects in memory. (CVE-2015-2387)
This security update is rated Important for all supported releases of Windows.
- Consequence
- Successful exploitation allows attackers to execute arbitrary code.
- Solution
-
Please refer to MS15-077 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-077 Windows 7 for 32-bit Systems Service Pack 1
MS15-077 Windows 7 for x64-based Systems Service Pack 1
MS15-077 Windows 8 for 32-bit Systems
MS15-077 Windows 8 for x64-based Systems
MS15-077 Windows 8.1 for 32-bit Systems
MS15-077 Windows 8.1 for x64-based Systems
MS15-077 Windows Server 2003 Service Pack 2
MS15-077 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-077 Windows Server 2003 x64 Edition Service Pack 2
MS15-077 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-077 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-077 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-077 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-077 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-077 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-077 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-077 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-077 Windows Server 2012
MS15-077 Windows Server 2012
MS15-077 Windows Server 2012 R2
MS15-077 Windows Server 2012 R2
MS15-077 Windows Vista Service Pack 2
MS15-077 Windows Vista x64 Edition Service Pack 2
These new vulnerability checks are included in Qualys vulnerability signature 2.3.62-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 91064
- 91070
- 91068
- 91072
- 91069
- 19983
- 100244
- 91063
- 110257
- 91065
- 91067
- 91071
- 91073
- 91066
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.