Microsoft security alert.
November 10, 2015
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 49 vulnerabilities that were fixed in 12 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 12 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Windows NDIS Privilege of Elevation Vulnerability (MS15-117)
- Severity
- Critical 4
- Qualys ID
- 91104
- Vendor Reference
- MS15-117
- CVE Reference
- CVE-2015-6098
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
An elevation of privilege vulnerability exists when NDIS fails to check the length of a buffer prior to copying memory into it. An attacker who successfully exploits this vulnerability could gain elevated privileges on a targeted system.
Microsoft has released a security update that corrects how NDIS validates buffer length.
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
- Consequence
- Exploitation could allow an attacker to cause privilege escalation attacks.
- Solution
-
Refer to MS15-117 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-117 Windows 7 for 32-bit Systems Service Pack 1
MS15-117 Windows 7 for x64-based Systems Service Pack 1
MS15-117 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-117 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-117 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-117 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-117 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-117 Windows Vista Service Pack 2
MS15-117 Windows Vista x64 Edition Service Pack 2
-
Microsoft Office Remote Code Execution Vulnerabilities (MS15-116)
- Severity
- Critical 4
- Qualys ID
- 110261
- Vendor Reference
- MS15-116
- CVE Reference
- CVE-2015-2503, CVE-2015-6038, CVE-2015-6091, CVE-2015-6092, CVE-2015-6093, CVE-2015-6094, CVE-2015-6123
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.
An elevation of privilege vulnerability exists in Microsoft Office software when an attacker instantiates an affected Office application via a COM control.
A spoofing vulnerability that could lead to information disclosure exists when Microsoft Outlook for Mac does not sanitize HTML or treat it in a safe manner.
The security update addresses the vulnerabilities by:
- Correcting how Office handles objects in memory
- Ensuring that Internet Explorer prevents affected Office applications from being instantiated via a COM control
- Correcting how Microsoft Outlook validates and sanitizes HTML inputThe security update is rated Important for all supported versions of Office.
- Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploits the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Refer to MS15-116 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-116 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)
MS15-116 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)
MS15-116 Excel Services on Microsoft SharePoint Server 2010 Service Pack 2
MS15-116 Excel Services on Microsoft SharePoint Server 2013 Service Pack 1
MS15-116 Microsoft Access 2007 Service Pack 3
MS15-116 Microsoft Access 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Access 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Access 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft Access 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Access 2016 (32-bit edition)
MS15-116 Microsoft Access 2016 (64-bit edition)
MS15-116 Microsoft Excel 2007 Service Pack 3
MS15-116 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Excel 2016 (32-bit edition)
MS15-116 Microsoft Excel 2016 (64-bit edition)
MS15-116 Microsoft Excel 2016 for Mac
MS15-116 Microsoft Excel Viewer
MS15-116 Microsoft Excel for Mac 2011
MS15-116 Microsoft InfoPath 2007 Service Pack 3
MS15-116 Microsoft InfoPath 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft InfoPath 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft InfoPath 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft InfoPath 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Office 2007 IME (Japanese) Service Pack 3
MS15-116 Microsoft Office 2007 Service Pack 3
MS15-116 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Office 2016 (32-bit edition)
MS15-116 Microsoft Office 2016 (32-bit edition)
MS15-116 Microsoft Office 2016 (64-bit edition)
MS15-116 Microsoft Office 2016 (64-bit edition)
MS15-116 Microsoft Office Compatibility Pack Service Pack 3
MS15-116 Microsoft Office Compatibility Pack Service Pack 3
MS15-116 Microsoft Office Web Apps 2010 Service Pack 2
MS15-116 Microsoft Office Web Apps Server 2013 Service Pack 1
MS15-116 Microsoft OneNote 2007 Service Pack 3
MS15-116 Microsoft OneNote 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft OneNote 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft OneNote 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft OneNote 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft OneNote 2016 (32-bit edition)
MS15-116 Microsoft OneNote 2016 (64-bit edition)
MS15-116 Microsoft Pinyin IME 2010 (32-bit version)
MS15-116 Microsoft Pinyin IME 2010 (64-bit version)
MS15-116 Microsoft PowerPoint 2007 Service Pack 3
MS15-116 Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft PowerPoint 2016 (32-bit edition)
MS15-116 Microsoft PowerPoint 2016 (64-bit edition)
MS15-116 Microsoft Project 2007 Service Pack 3
MS15-116 Microsoft Project 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Project 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Project 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft Project 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Project 2016 (32-bit edition)
MS15-116 Microsoft Project 2016 (64-bit edition)
MS15-116 Microsoft Publisher 2007 Service Pack 3
MS15-116 Microsoft Publisher 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Publisher 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Publisher 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft Publisher 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Publisher 2016 (32-bit edition)
MS15-116 Microsoft Publisher 2016 (64-bit edition)
MS15-116 Microsoft Visio 2007 Service Pack 3
MS15-116 Microsoft Visio 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Visio 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Visio 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft Visio 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Visio 2016 (32-bit edition)
MS15-116 Microsoft Visio 2016 (64-bit edition)
MS15-116 Microsoft Word 2007 Service Pack 3
MS15-116 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS15-116 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS15-116 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS15-116 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS15-116 Microsoft Word 2016 (32-bit edition)
MS15-116 Microsoft Word 2016 (64-bit edition)
MS15-116 Microsoft Word Viewer
MS15-116 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
MS15-116 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
-
Microsoft Internet Explorer Cumulative Security Update (MS15-112)
- Severity
- Urgent 5
- Qualys ID
- 100266
- Vendor Reference
- MS15-112
- CVE Reference
- CVE-2015-2427, CVE-2015-6064, CVE-2015-6065, CVE-2015-6066, CVE-2015-6068, CVE-2015-6069, CVE-2015-6070, CVE-2015-6071, CVE-2015-6072, CVE-2015-6073, CVE-2015-6074, CVE-2015-6075, CVE-2015-6076, CVE-2015-6077, CVE-2015-6078, CVE-2015-6079, CVE-2015-6080, CVE-2015-6081, CVE-2015-6082, CVE-2015-6084, CVE-2015-6085, CVE-2015-6086, CVE-2015-6087, CVE-2015-6088, CVE-2015-6089
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
- Consequence
- An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS15-112 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-112 Windows 10 Version 1511 for 32-bit Systems
MS15-112 Windows 10 Version 1511 for x64-based Systems
MS15-112 Windows 10 for 32-bit Systems
MS15-112 Windows 10 for x64-based Systems
MS15-112 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-112 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-112 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-112 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-112 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-112 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-112 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-112 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-112 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-112 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-112 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-112 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-112 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-112 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-112 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-112 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-112 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-112 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-112 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-112 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-112 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-112 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-112 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-112 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-112 Windows Server 2012(Internet Explorer 10)
MS15-112 Windows Server 2012 R2(Internet Explorer 11)
MS15-112 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-112 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-112 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-112 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-112 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-112 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Edge Cumulative Security Update (MS15-113)
- Severity
- Urgent 5
- Qualys ID
- 91109
- Vendor Reference
- MS15-113
- CVE Reference
- CVE-2015-6064, CVE-2015-6073, CVE-2015-6078, CVE-2015-6088
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Edge is a web browser developed by Microsoft and included in the company's Windows 10 operating systems, replacing Internet Explorer as the default web browser on all device classes.
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow information disclosure if a user views a specially crafted webpage using Microsoft Edge.
This security update is rated Important for Microsoft Edge on Windows 10.
- Consequence
- An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user.
- Solution
-
Refer to Microsoft Security Bulletin MS15-113 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-113 Windows 10 Version 1511 for 32-bit Systems
MS15-113 Windows 10 Version 1511 for x64-based Systems
MS15-113 Windows 10 for 32-bit Systems
MS15-113 Windows 10 for x64-based Systems
-
Microsoft Windows Journal Remote Code Execution Vulnerability (MS15-114)
- Severity
- Critical 4
- Qualys ID
- 91111
- Vendor Reference
- MS15-114
- CVE Reference
- CVE-2015-6097
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Windows Journal is a notetaking application. Remote code execution vulnerabilities exist in Microsoft Windows when a specially crafted Journal file is opened in Windows Journal.
The update addresses the vulnerability by modifying how Windows Journal parses Journal files.
This security update is rated Critical.
Affected Versions:
Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2. - Consequence
- An attacker who successfully exploits the vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative user rights, an attacker could take control of the affected system.
- Solution
-
Refer to Microsoft Security Bulletin MS15-114 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-114 Windows 7 for 32-bit Systems Service Pack 1
MS15-114 Windows 7 for x64-based Systems Service Pack 1
MS15-114 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-114 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-114 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-114 Windows Vista Service Pack 2
MS15-114 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Remote Code Execution Vulnerability (MS15-115)
- Severity
- Urgent 5
- Qualys ID
- 91112
- Vendor Reference
- MS15-115
- CVE Reference
- CVE-2015-6100, CVE-2015-6101, CVE-2015-6102, CVE-2015-6103, CVE-2015-6104, CVE-2015-6109, CVE-2015-6113
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Multiple vulnerabilities affect the Windows Kernel and Windows Graphics components.
- Multiple elevation of privilege vulnerabilities exist in the way that Windows handles objects in memory.
- Multiple information disclosure vulnerabilities exist when Windows fails to properly initialize memory addresses, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass.
- Multiple remote code execution vulnerabilities exist when the Adobe Type Manager Library in Windows improperly handles specially crafted embedded fonts.
- Consequence
- Successful exploitation allows an attacker to execute arbitrary code.
- Solution
-
Refer to MS15-115 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-115 Windows 10 Version 1511 for 32-bit Systems
MS15-115 Windows 10 Version 1511 for x64-based Systems
MS15-115 Windows 10 for 32-bit Systems
MS15-115 Windows 10 for x64-based Systems
MS15-115 Windows 7 for 32-bit Systems Service Pack 1
MS15-115 Windows 7 for 32-bit Systems Service Pack 1
MS15-115 Windows 7 for x64-based Systems Service Pack 1
MS15-115 Windows 7 for x64-based Systems Service Pack 1
MS15-115 Windows 8 for 32-bit Systems
MS15-115 Windows 8 for 32-bit Systems
MS15-115 Windows 8 for x64-based Systems
MS15-115 Windows 8 for x64-based Systems
MS15-115 Windows 8.1 for 32-bit Systems
MS15-115 Windows 8.1 for 32-bit Systems
MS15-115 Windows 8.1 for x64-based Systems
MS15-115 Windows 8.1 for x64-based Systems
MS15-115 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-115 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-115 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-115 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-115 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-115 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-115 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-115 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-115 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-115 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-115 Windows Server 2012
MS15-115 Windows Server 2012
MS15-115 Windows Server 2012 R2
MS15-115 Windows Server 2012 R2
MS15-115 Windows Vista Service Pack 2
MS15-115 Windows Vista Service Pack 2
MS15-115 Windows Vista x64 Edition Service Pack 2
MS15-115 Windows Vista x64 Edition Service Pack 2
-
Microsoft .Net Framework Multiple Vulnerabilities (MS15-118)
- Severity
- Serious 3
- Qualys ID
- 91108
- Vendor Reference
- MS15-118
- CVE Reference
- CVE-2015-6096, CVE-2015-6099, CVE-2015-6115
- CVSS Scores
- Base 4.3 / Temporal 3.4
- Description
-
The Microsoft .NET Framework is a software framework for computers running Microsoft Windows operating systems.
A cross-site scripting (XSS) vulnerability exists in the way that .NET Framework validates the value of a HTTP request. An attacker who successfully exploited this vulnerability could inject a client-side script in the user's browser (CVE-2015-6099).
An information disclosure vulnerability exists in the .NET Framework DTD parsing of certain specially crafted XML files. An attacker who successfully exploited this vulnerability could gain read access to local files on the target system (CVE-2015-6096).
A security feature bypass exists in a .NET Framework component that does not properly implement the Address Space Layout Randomization (ASLR) security feature, which protects users from a broad class of vulnerabilities. The ASLR bypass could allow an attacker to bypass the security feature and then load additional malicious code in an attempt to exploit another vulnerability (CVE-2015-6115).
This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4, Microsoft .NET Framework 4.5, Microsoft .NET Framework 4.5.1, Microsoft .NET Framework 4.5.2, and Microsoft .NET Framework 4.6 on affected releases of Microsoft Windows
- Consequence
- Successfully exploiting these vulnerabilities might allow a remote attacker to gain escalated privileges, perform cross-site scripting attacks, gather sensitive information and also cause ASLR bypass to execute arbitrary code in conjunction with another vulnerability.
- Solution
-
Refer to MS15-118 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-118 Windows 10(Microsoft .NET Framework 3.5)
MS15-118 Windows 10(Microsoft .NET Framework 4.6)
MS15-118 Windows 7 Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-118 Windows 7 Service Pack 1(Microsoft .NET Framework 4)
MS15-118 Windows 7 Service Pack 1(Microsoft .NET Framework 4)
MS15-118 Windows 7 Service Pack 1(Microsoft .NET Framework 4.6)
MS15-118 Windows 7 Service Pack 1(Microsoft .NET Framework 4.6)
MS15-118 Windows 7 Service Pack 1(icrosoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows 7 Service Pack 1(icrosoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows 8(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows 8(Microsoft .NET Framework 4.6)
MS15-118 Windows 8(Microsoft .NET Framework 4.6)
MS15-118 Windows 8(Microsoft .NET Framework 3.5)
MS15-118 Windows 8(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows 8.1(Microsoft .NET Framework 3.5)
MS15-118 Windows 8.1(Microsoft .NET Framework 4.5.1)
MS15-118 Windows 8.1(Microsoft .NET Framework 4.5.1 and 4.5.2)
MS15-118 Windows 8.1(Microsoft .NET Framework 4.6)
MS15-118 Windows 8.1(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-118 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-118 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-118 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2008 R2 for x64-based Systems Service Pack 1(icrosoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Server 2008 R2 for x64-based Systems Service Pack 1(icrosoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Server 2008 Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-118 Windows Server 2008 Service Pack 2(Microsoft .NET Framework 4)
MS15-118 Windows Server 2008 Service Pack 2(Microsoft .NET Framework 4)
MS15-118 Windows Server 2008 Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Server 2008 Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Server 2008 Service Pack 2(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2008 Service Pack 2(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2012(Microsoft .NET Framework 3.5)
MS15-118 Windows Server 2012(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Server 2012(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Server 2012(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2012(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS15-118 Windows Server 2012 R2(Microsoft .NET Framework 4.5.1)
MS15-118 Windows Server 2012 R2(Microsoft .NET Framework 4.5.1 and 4.5.2)
MS15-118 Windows Server 2012 R2(Microsoft .NET Framework 4.6)
MS15-118 Windows Server 2012 R2(Microsoft .NET Framework 4.6)
MS15-118 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-118 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-118 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-118 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-118 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS15-118 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
-
Microsoft Windows Winsock Privilege Escalation Vulnerability (MS15-119)
- Severity
- Critical 4
- Qualys ID
- 91110
- Vendor Reference
- MS15-119
- CVE Reference
- CVE-2015-2478
- CVSS Scores
- Base 7.2 / Temporal 5.6
- Description
-
The Ancillary Function Driver (AFD) supports Windows sockets applications and is contained in the afd.sys file. The afd.sys driver runs in kernel mode and manages the Winsock TCP/IP communications protocol. This Winsock kernel interface provides access to the TDI transports.
An elevation of privilege vulnerability exists in Microsoft Windows when Winsock makes a call to a memory address without verifying that the address is valid.
Microsoft has released a security update that addresses the vulnerability by preventing Winsock from accessing invalid memory addresses.
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs specially crafted code that is designed to exploit the vulnerability.
- Solution
-
Refer to MS15-119 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-119 Windows 10 Version 1511 for 32-bit Systems
MS15-119 Windows 10 Version 1511 for x64-based Systems
MS15-119 Windows 10 for 32-bit Systems
MS15-119 Windows 10 for x64-based Systems
MS15-119 Windows 7 for 32-bit Systems Service Pack 1
MS15-119 Windows 7 for x64-based Systems Service Pack 1
MS15-119 Windows 8 for 32-bit Systems
MS15-119 Windows 8 for x64-based Systems
MS15-119 Windows 8.1 for 32-bit Systems
MS15-119 Windows 8.1 for x64-based Systems
MS15-119 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-119 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-119 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-119 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-119 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-119 Windows Server 2012
MS15-119 Windows Server 2012 R2
MS15-119 Windows Vista Service Pack 2
MS15-119 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows IPSec Denial of Service Vulnerability (MS15-120)
- Severity
- Serious 3
- Qualys ID
- 91106
- Vendor Reference
- MS15-120
- CVE Reference
- CVE-2015-6111
- CVSS Scores
- Base 6.8 / Temporal 5
- Description
-
Microsoft Windows is vulnerable to a denial of service vulnerablity when the Internet Protocol Security (IPSec) service improperly handles encryption negotiation.
Affected Software:
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1
Windows Server 2012 (CORE)
Windows Server 2012 R2 (CORE)
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- An attacker who successfully exploited the vulnerability could cause the system to become nonresponsive.
- Solution
-
Refer to Microsoft Security Bulletin MS15-120 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-120 Windows 8 for 32-bit Systems
MS15-120 Windows 8 for x64-based Systems
MS15-120 Windows 8.1 for 32-bit Systems
MS15-120 Windows 8.1 for x64-based Systems
MS15-120 Windows Server 2012
MS15-120 Windows Server 2012 R2
-
Microsoft Schannel Spoofing Vulnerability (MS15-121)
- Severity
- Critical 4
- Qualys ID
- 91107
- Vendor Reference
- MS15-121
- CVE Reference
- CVE-2015-6112
- CVSS Scores
- Base 5.8 / Temporal 4.3
- Description
-
Microsoft Windows is vulnerable to a schannel spoofing vulnerability caused by a weakness in with the TLS protocol.
The update addresses the vulnerability by adding extended master secret binding support to all supported version of TLS.Affected Software:
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1
Windows Server 2008 (CORE) for 32-bit Systems Service Pack 2
Windows Server 2008 (CORE) for x64-based Systems Service Pack 2
Windows Server 2008 R2 (CORE) for x64-based Systems Service Pack 1
Windows Server 2012 (CORE)
Windows Server 2012 R2 (CORE)
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- An attacker who successfully exploited this vulnerability could impersonate a victim that uses the same credentials as those used between the client and server where the attack is initiated.
- Solution
-
Refer to Microsoft Security Bulletin MS15-121 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-121 Windows 7 for 32-bit Systems Service Pack 1
MS15-121 Windows 7 for x64-based Systems Service Pack 1
MS15-121 Windows 8 for 32-bit Systems
MS15-121 Windows 8 for x64-based Systems
MS15-121 Windows 8.1 for 32-bit Systems
MS15-121 Windows 8.1 for x64-based Systems
MS15-121 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-121 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-121 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-121 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-121 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-121 Windows Server 2012
MS15-121 Windows Server 2012 R2
MS15-121 Windows Vista Service Pack 2
MS15-121 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Kerberos Security Feature Bypass Vulnerability (MS15-122)
- Severity
- Serious 3
- Qualys ID
- 91105
- Vendor Reference
- MS15-122
- CVE Reference
- CVE-2015-6095
- CVSS Scores
- Base 4.9 / Temporal 3.6
- Description
-
Kerberos is a computer network authentication protocol which works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
A security feature bypass exists in Windows when Kerberos fails to checks the password change of a user signing in to a workstation. An attacker who successfully exploits the bypass could use it to unlock a workstation and decrypt drives protected by BitLocker (CVE-2015-6095).
This security update is rated Important for all supported editions of Windows.
- Consequence
- Successfully exploiting this vulnerability might allow an attacker to bypass Kerberos authentication on a target machine.
- Solution
-
Refer to MS15-122 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-122 Windows 10 Version 1511 for 32-bit Systems
MS15-122 Windows 10 Version 1511 for x64-based Systems
MS15-122 Windows 10 for 32-bit Systems
MS15-122 Windows 10 for x64-based Systems
MS15-122 Windows 7 for 32-bit Systems Service Pack 1
MS15-122 Windows 7 for x64-based Systems Service Pack 1
MS15-122 Windows 8 for 32-bit Systems
MS15-122 Windows 8 for x64-based Systems
MS15-122 Windows 8.1 for 32-bit Systems
MS15-122 Windows 8.1 for x64-based Systems
MS15-122 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-122 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-122 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-122 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-122 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-122 Windows Server 2012
MS15-122 Windows Server 2012 R2
MS15-122 Windows Vista Service Pack 2
MS15-122 Windows Vista x64 Edition Service Pack 2
-
Microsoft Skype For Business And Microsoft Lync Information Disclosure Vulnerability (MS15-123)
- Severity
- Critical 4
- Qualys ID
- 91113
- Vendor Reference
- MS15-123
- CVE Reference
- CVE-2015-6061
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
- An information disclosure vulnerability exists when Skype for Business and Microsoft Lync clients improperly sanitize specially crafted content. An attacker who successfully exploits the vulnerability could execute HTML and JavaScript content in the Skype for Business or Lync context.
- Consequence
- Successful exploitation allows attackers to execute HTML and JavaScript content to get sensitive information.
- Solution
-
Refer to MS15-123 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-123 Microsoft Lync 2010
MS15-123 Microsoft Lync 2010
MS15-123 Microsoft Lync 2010 Attendee
MS15-123 Microsoft Lync 2010 Attendee
MS15-123 Microsoft Lync 2013 Service Pack 1
MS15-123 Microsoft Lync 2013 Service Pack 1
MS15-123 Microsoft Lync Basic 2013 Service Pack 1
MS15-123 Microsoft Lync Basic 2013 Service Pack 1
MS15-123 Microsoft Lync Room System
MS15-123 Microsoft Lync Room System
MS15-123 Skype for Business 2016
MS15-123 Skype for Business 2016
MS15-123 Skype for Business Basic 2016
MS15-123 Skype for Business Basic 2016
These new vulnerability checks are included in Qualys vulnerability signature 2.3.158-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 91104
- 110261
- 100266
- 91109
- 91111
- 91112
- 91108
- 91110
- 91106
- 91107
- 91105
- 91113
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.