Microsoft security alert.
December 8, 2015
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 58 vulnerabilities that were fixed in 12 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 12 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Windows Remote Code Execution Vulnerability (MS15-132)
- Severity
- Critical 4
- Qualys ID
- 91132
- Vendor Reference
- MS15-132
- CVE Reference
- CVE-2015-6128, CVE-2015-6132, CVE-2015-6133
- CVSS Scores
- Base 7.2 / Temporal 5.6
- Description
-
The security update addresses the vulnerabilities by correcting how Windows validates input before loading libraries.
This security update is rated Important all supported releases of Microsoft Windows. - Consequence
- The vulnerabilities could allow remote code execution if an attacker accesses a local system and runs a specially crafted application. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system.
- Solution
-
Please refer to MS15-132 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-132 Windows 10 Version 1511 for 32-bit Systems
MS15-132 Windows 10 Version 1511 for x64-based Systems
MS15-132 Windows 10 for 32-bit Systems
MS15-132 Windows 10 for x64-based Systems
MS15-132 Windows 7 for 32-bit Systems Service Pack 1
MS15-132 Windows 7 for 32-bit Systems Service Pack 1
MS15-132 Windows 7 for x64-based Systems Service Pack 1
MS15-132 Windows 7 for x64-based Systems Service Pack 1
MS15-132 Windows 8 for 32-bit Systems
MS15-132 Windows 8 for 32-bit Systems
MS15-132 Windows 8 for x64-based Systems
MS15-132 Windows 8 for x64-based Systems
MS15-132 Windows 8.1 for 32-bit Systems
MS15-132 Windows 8.1 for 32-bit Systems
MS15-132 Windows 8.1 for x64-based Systems
MS15-132 Windows 8.1 for x64-based Systems
MS15-132 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-132 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-132 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-132 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-132 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-132 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-132 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-132 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-132 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-132 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-132 Windows Server 2012
MS15-132 Windows Server 2012
MS15-132 Windows Server 2012 R2
MS15-132 Windows Server 2012 R2
MS15-132 Windows Vista Service Pack 2
MS15-132 Windows Vista Service Pack 2
MS15-132 Windows Vista x64 Edition Service Pack 2
MS15-132 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows PGM Elevation of Privilege Vulnerability (MS15-133)
- Severity
- Serious 3
- Qualys ID
- 91136
- Vendor Reference
- MS15-133
- CVE Reference
- CVE-2015-6126
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
An elevation of privilege vulnerability exists in the Windows Pragmatic General Multicast (PGM) protocol that is caused when an attacker-induced race condition results in references to memory contents that have already been freed.
This security update is rated Important for supported releases of Microsoft Windows.
- Consequence
- The vulnerabilities could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application.
- Solution
-
Refer to MS15-133 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-133 Windows 10 Version 1511 for 32-bit Systems
MS15-133 Windows 10 Version 1511 for x64-based Systems
MS15-133 Windows 10 for 32-bit Systems
MS15-133 Windows 10 for x64-based Systems
MS15-133 Windows 7 for 32-bit Systems Service Pack 1
MS15-133 Windows 7 for x64-based Systems Service Pack 1
MS15-133 Windows 8 for 32-bit Systems
MS15-133 Windows 8 for x64-based Systems
MS15-133 Windows 8.1 for 32-bit Systems
MS15-133 Windows 8.1 for x64-based Systems
MS15-133 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-133 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-133 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-133 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-133 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-133 Windows Server 2012
MS15-133 Windows Server 2012 R2
MS15-133 Windows Vista Service Pack 2
MS15-133 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Media Center Remote Code Execution Vulnerability (MS15-134)
- Severity
- Critical 4
- Qualys ID
- 91137
- Vendor Reference
- MS15-134
- CVE Reference
- CVE-2015-6127, CVE-2015-6131
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
This security update resolves a vulnerability in Microsoft Windows.
A vulnerability exists in Windows Media Center that could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code
This security update is rated Important for all supported editions of Windows Media Center when installed on Windows Vista, Windows 7, Windows 8, or Windows 8.1.
- Consequence
-
Successful exploitation allows an attacker to execute arbitrary code.
- Solution
-
Refer to Microsoft Security Bulletin MS15-134 for further details.
Workaround:
Unregister the MCL protocol handler.-Backup the following regkey:
[HKEY_CLASSES_ROOT\MCL]-Delete the following regkey:
[HKEY_CLASSES_ROOT\MCL]Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-134 Windows 7 for 32-bit Systems Service Pack 1(Windows Media Center)
MS15-134 Windows 7 for x64-based Systems Service Pack 1(Windows Media Center)
MS15-134 Windows 8 for 32-bit Systems(Windows Media Center)
MS15-134 Windows 8 for x64-based Systems(Windows Media Center)
MS15-134 Windows 8.1 for 32-bit Systems(Windows Media Center)
MS15-134 Windows 8.1 for x64-based Systems(Windows Media Center)
MS15-134 Windows Vista Service Pack 2(Windows Media Center)
MS15-134 Windows Vista x64 Edition Service Pack 2(Windows Media Center)
-
Microsoft Windows Kernel-Mode Drivers Privilege Escalation Vulnerabilities (MS15-135)
- Severity
- Critical 4
- Qualys ID
- 91133
- Vendor Reference
- MS15-135
- CVE Reference
- CVE-2015-6171, CVE-2015-6173, CVE-2015-6174, CVE-2015-6175
- CVSS Scores
- Base 7.2 / Temporal 6.3
- Description
-
Multiple elevation of privilege vulnerabilities exist due to the way the Windows kernel handles objects in memory.
Microsoft has released a security update that addresses the vulnerability by correcting how the Windows kernel and Windows font drivers handle objects in memory.
This security update is rated Important for supported releases of Microsoft Windows.
- Consequence
- This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application.
- Solution
-
Refer to MS15-135 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-135 Windows 10 Version 1511 for 32-bit Systems
MS15-135 Windows 10 Version 1511 for x64-based Systems
MS15-135 Windows 10 for 32-bit Systems
MS15-135 Windows 10 for x64-based Systems
MS15-135 Windows 7 for 32-bit Systems Service Pack 1
MS15-135 Windows 7 for x64-based Systems Service Pack 1
MS15-135 Windows 8 for 32-bit Systems
MS15-135 Windows 8 for x64-based Systems
MS15-135 Windows 8.1 for 32-bit Systems
MS15-135 Windows 8.1 for x64-based Systems
MS15-135 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-135 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-135 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-135 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-135 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-135 Windows Server 2012
MS15-135 Windows Server 2012 R2
MS15-135 Windows Vista Service Pack 2
MS15-135 Windows Vista x64 Edition Service Pack 2
-
Microsoft Internet Explorer Cumulative Security Update (MS15-124)
- Severity
- Urgent 5
- Qualys ID
- 100269
- Vendor Reference
- MS15-124
- CVE Reference
- CVE-2015-6083, CVE-2015-6134, CVE-2015-6135, CVE-2015-6136, CVE-2015-6138, CVE-2015-6139, CVE-2015-6140, CVE-2015-6141, CVE-2015-6142, CVE-2015-6143, CVE-2015-6144, CVE-2015-6145, CVE-2015-6146, CVE-2015-6147, CVE-2015-6148, CVE-2015-6149, CVE-2015-6150, CVE-2015-6151, CVE-2015-6152, CVE-2015-6153, CVE-2015-6154, CVE-2015-6155, CVE-2015-6156, CVE-2015-6157, CVE-2015-6158, CVE-2015-6159, CVE-2015-6160, CVE-2015-6161, CVE-2015-6162, CVE-2015-6164
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves multiple vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
Update (8/15/2017): The QID has been updated to additionally check for MS15-135 (For OS prior to Windows 10) and check for "FEATURE_ALLOW_USER32_EXCEPTION_HANDLER_HARDENING" as described in the fix for CVE-2015-6161 in MS15-124
QID Detection Logic:
Operating Systems: Windows Vista, Windows Server 2008 SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows RT, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, Windows 10 (build 1507 and 1511).
The QID checks if the host is running a vulnerable version of Internet Explorer with the help of the file %windir%\System32\mshtml.dll
The following KBs are checked:
The patch version of 7.0.6002.19537(KB3104002)
The patch version of 7.0.6002.23847(KB3104002)
The patch version of 8.0.6001.19705(KB3104002)
The patch version of 8.0.6001.23765(KB3104002)
The patch version of 8.0.6001.23952(KB3104002)
The patch version of 8.0.7601.19058(KB3104002)
The patch version of 8.0.7601.23262(KB3104002)
The patch version of 9.0.8112.16723(KB3104002)
The patch version of 9.0.8112.20838(KB3104002)
The patch version of 10.0.9200.17566(KB3104002)
The patch version of 10.0.9200.21684(KB3104002)
The patch version of 11.0.9600.18125(KB3104002)
The patch version of 11.0.10240.16603(KB3116869)
The patch version of 11.0.10586.20(KB3116900)The QID additionally checks if the patch for CVE-2015-6161 is enabled or not by check for:
1) MS15-135 on Operating Systems before Windows 10:
Operating Systems: Windows Vista, Windows Server 2008 SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows RT, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2
the file version of %windir%\System32\win32k.sys
The patch version of 6.0.6002.19535(KB3109094)
The patch version of 6.0.6002.23845(KB3109094)
The patch version of 6.1.7601.19061(KB3109094)
The patch version of 6.1.7601.23265(KB3109094)
The patch version of 6.2.9200.17568(KB3109094)
The patch version of 6.2.9200.21687(KB3109094)
The patch version of 6.3.9600.18123(KB3109094)2) The following Registry keys are configured on all affected OS:
a)HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ALLOW_USER32_EXCEPTION_HANDLER_HARDENING\iexplore.exe with value 1
b)HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ALLOW_USER32_EXCEPTION_HANDLER_HARDENING\iexplore.exe with value 1 (64 bit only)
Note: The QID has been updated to check for the additional steps required to enable fix for CVE-2015-6161 even when later updates than MS15-124 are applied. This is because the fix for CVE-2015-6161 is disabled by default and needs to be enabled manually even after applying latest updates on affected Operating Systems.
Note (02/26/2018) : The QID has been updated to check for the additional steps required to enable fix for CVE-2015-6161 even when later updates than MS15-124 are applied. This is because the fix for CVE-2015-6161 is disabled by default and needs to be enabled manually even after applying latest updates on affected Operating Systems.
- Consequence
-
A remote, unauthenticated attacker could exploit these vulnerabilities to conduct cross-site scripting attacks, elevate their privileges, execute arbitrary code or cause a denial of service condition on the targeted system.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS15-124 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-124 Windows 10 Version 1511 for 32-bit Systems
MS15-124 Windows 10 Version 1511 for x64-based Systems
MS15-124 Windows 10 for 32-bit Systems
MS15-124 Windows 10 for x64-based Systems
MS15-124 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-124 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-124 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-124 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-124 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-124 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-124 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-124 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-124 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-124 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-124 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-124 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-124 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-124 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-124 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-124 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-124 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-124 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-124 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-124 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-124 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-124 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-124 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-124 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-124 Windows Server 2012(Internet Explorer 10)
MS15-124 Windows Server 2012 R2(Internet Explorer 11)
MS15-124 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-124 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-124 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-124 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-124 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-124 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Edge Cumulative Security Update (MS15-125)
- Severity
- Critical 4
- Qualys ID
- 91138
- Vendor Reference
- MS15-125
- CVE Reference
- CVE-2015-6139, CVE-2015-6140, CVE-2015-6142, CVE-2015-6148, CVE-2015-6151, CVE-2015-6153, CVE-2015-6154, CVE-2015-6155, CVE-2015-6158, CVE-2015-6159, CVE-2015-6161, CVE-2015-6168, CVE-2015-6169, CVE-2015-6170, CVE-2015-6176
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Edge is a web browser developed by Microsoft and included in the company's Windows 10 operating systems, replacing Internet Explorer as the default web browser on all device classes.
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow code execution with elevated privileges if a user views a specially crafted webpage using Microsoft Edge.
This security update is rated critical for Microsoft Edge on Windows 10.
- Consequence
-
Successful exploitation allows a remote attacker to elevate their privileges or execute arbitrary code on a targeted system.
- Solution
-
Customers are advised to refer to Microsoft Security Bulletin MS15-125 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-125 Windows 10 Version 1511 for 32-bit Systems
MS15-125 Windows 10 Version 1511 for x64-based Systems
MS15-125 Windows 10 for 32-bit Systems
MS15-125 Windows 10 for x64-based Systems
-
Microsoft JScript and VBScript Remote Code Execution Vulnerabilities (MS15-126)
- Severity
- Urgent 5
- Qualys ID
- 91134
- Vendor Reference
- MS15-126
- CVE Reference
- CVE-2015-6135, CVE-2015-6136
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
The update addresses the vulnerabilities by modifying how the VBScript scripting engine handle objects in memory.
An information disclosure vulnerability exists when VBScript improperly discloses the contents of its memory. (CVE-2015-6135)
A remote code execution vulnerability exists in the way that the VBScript engine renders, when handling objects in memory in Internet Explorer. (CVE-2015-6136)
This security update is rated Critical for affected versions of the VBScript scripting engine on supported editions of Windows Vista, Windows Server 2008, and Server Core installations of Windows Server 2008 R2. - Consequence
- The more severe of the vulnerabilities could allow remote code execution if an attacker hosts a specially crafted website that is designed to exploit the vulnerabilities through Internet Explorer (or leverages a compromised website or a website that accepts or hosts user-provided content or advertisements) and then convinces a user to view the website.
- Solution
-
Please refer to MS15-126 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-126 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation only)(VBScript 5.8)
MS15-126 Windows Server 2008 for 32-bit Systems Service Pack 2(VBScript 5.7)
MS15-126 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS15-126 Windows Server 2008 for Itanium-based Systems Service Pack 2(VBScript 5.7)
MS15-126 Windows Server 2008 for x64-based Systems Service Pack 2(VBScript 5.7)
MS15-126 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS15-126 Windows Vista Service Pack 2(VBScript 5.7)
MS15-126 Windows Vista x64 Edition Service Pack 2(VBScript 5.7)
-
Microsoft Windows DNS Server Remote Code Execution Vulnerability (MS15-127)
- Severity
- Urgent 5
- Qualys ID
- 91131
- Vendor Reference
- MS15-127
- CVE Reference
- CVE-2015-6125
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Windows DNS server is vulnerable to a remote code execution issue due to failing to properly parse requests.
This security update is rated Critical for 32-bit and x64-based editions of Windows Server 2008, and x64-based editions of Windows Server 2008 R2; and all supported editions of Windows Server 2012.
- Consequence
-
Successful exploitation allows an attacker to execute arbitrary code.
- Solution
-
Refer to MS15-127 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-127 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-127 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-127 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-127 Windows Server 2012
MS15-127 Windows Server 2012 R2
-
Microsoft Windows Graphics Component Remote Code Execution Vulnerability (MS15-128)
- Severity
- Urgent 5
- Qualys ID
- 91140
- Vendor Reference
- MS15-128
- CVE Reference
- CVE-2015-6106, CVE-2015-6107, CVE-2015-6108
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Multiple remote code execution vulnerabilities exist when the Windows font library improperly handles specially crafted embedded fonts.
This security update is rated Critical for all supported releases of Microsoft Windows, affected editions of Microsoft Office 2007 and Microsoft Office 2010, affected versions of Microsoft .NET Framework on all supported releases of Microsoft Windows, affected editions of Skype for Business 2016, Microsoft Lync 2013, and Microsoft Lync 2010.
- Consequence
- An attacker who successfully exploited these vulnerabilities can install programs, view, change, or delete data,or create new accounts with full user rights.
- Solution
-
Refer to MS15-128 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-128 Microsoft Live Meeting 2007 Console
MS15-128 Microsoft Lync 2010
MS15-128 Microsoft Lync 2010
MS15-128 Microsoft Lync 2010 Attendee
MS15-128 Microsoft Lync 2010 Attendee
MS15-128 Microsoft Lync 2013 Service Pack 1
MS15-128 Microsoft Lync 2013 Service Pack 1
MS15-128 Microsoft Lync Basic 2013 Service Pack 1
MS15-128 Microsoft Lync Basic 2013 Service Pack 1
MS15-128 Microsoft Office 2007 Service Pack 3
MS15-128 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-128 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-128 Microsoft Silverlight 5
MS15-128 Microsoft Silverlight 5 Developer Runtime
MS15-128 Microsoft Word Viewer
MS15-128 Skype for Business 2016
MS15-128 Skype for Business 2016
MS15-128 Skype for Business Basic 2016
MS15-128 Skype for Business Basic 2016
MS15-128 Windows 10 Version 1511 for 32-bit Systems
MS15-128 Windows 10 Version 1511 for x64-based Systems
MS15-128 Windows 10 for 32-bit Systems
MS15-128 Windows 10 for 64-bit Systems
MS15-128 Windows 10 for x64-based Systems
MS15-128 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-128 Windows 7 for 32-bit Systems Service Pack 1
MS15-128 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-128 Windows 7 for x64-based Systems Service Pack 1
MS15-128 Windows 8 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-128 Windows 8 for 32-bit Systems
MS15-128 Windows 8 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-128 Windows 8 for x64-based Systems
MS15-128 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-128 Windows 8.1 for 32-bit Systems
MS15-128 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-128 Windows 8.1 for x64-based Systems
MS15-128 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-128 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-128 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-128 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS15-128 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-128 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-128 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-128 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS15-128 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-128 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-128 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-128 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-128 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-128 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS15-128 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-128 Windows Server 2012(Microsoft .NET Framework 3.5)
MS15-128 Windows Server 2012
MS15-128 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-128 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS15-128 Windows Server 2012 R2
MS15-128 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-128 Windows Vista Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-128 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-128 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-128 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS15-128 Windows Vista Service Pack 2
MS15-128 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS15-128 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-128 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-128 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
MS15-128 Windows Vista x64 Edition Service Pack 2
-
Microsoft Silverlight Remote Code Execution Vulnerability (MS15-129)
- Severity
- Urgent 5
- Qualys ID
- 91139
- Vendor Reference
- MS15-129
- CVE Reference
- CVE-2015-6114, CVE-2015-6165, CVE-2015-6166
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
A remote code execution vulnerability exists when Microsoft Silverlight incorrectly handles certain open and close requests that can result in read- and write-access violations.
Multiple information disclosure vulnerabilities exist when Silverlight fails to properly handle objects in memory, which can allow an attacker to more reliably predict pointer values and degrade the efficacy of the Address Space Layout Randomization (ASLR) security feature.
Affected Software:
Microsoft Silverlight 5 Developer RuntimeThis security update is rated Critical for all supported editions.
- Consequence
-
Successful exploitation allows attacker to execute arbitrary code.
- Solution
-
Refer to Microsoft Security Bulletin MS15-129 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-129 Microsoft Silverlight 5
MS15-129 Microsoft Silverlight 5 Developer Runtime
-
Microsoft Windows Uniscribe Remote Code Execution Vulnerability (MS15-130)
- Severity
- Critical 4
- Qualys ID
- 91135
- Vendor Reference
- MS15-130
- CVE Reference
- CVE-2015-6130
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
This security update resolves a vulnerability in Microsoft Windows.
The security update addresses the vulnerability by correcting how Windows parses fonts.
This security update is rated Critical for all supported editions of Windows 7 and Windows Server 2008 R2.
- Consequence
- The vulnerabilities can be exploited by malicious users to execute arbitrary code with the privileges of the current user.
- Solution
-
Please refer to MS15-130 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-130 Windows 7 for 32-bit Systems Service Pack 1
MS15-130 Windows 7 for x64-based Systems Service Pack 1
MS15-130 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-130 Windows Server 2008 R2 for x64-based Systems Service Pack 1
-
Microsoft Office Remote Code Execution Vulnerabilities (MS15-131)
- Severity
- Urgent 5
- Qualys ID
- 110262
- Vendor Reference
- MS15-131
- CVE Reference
- CVE-2015-6040, CVE-2015-6118, CVE-2015-6122, CVE-2015-6124, CVE-2015-6172, CVE-2015-6177
- CVSS Scores
- Base 9.3 / Temporal 8.1
- Description
-
Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.
A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially crafted email messages.
Microsoft has released a security update that addresses the vulnerabilities by correcting how Office handles objects in memory and by adding a check when parsing email messages of a specific format.
The security update is rated as Critical.
- Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Refer to MS15-131 for more information.
Workaround:
1) Disable previewing messages in Outlook2) Disable reading Outlook email messages in HTML
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-131 Microsoft Excel 2007 Service Pack 3
MS15-131 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS15-131 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS15-131 Microsoft Excel 2016 for Mac
MS15-131 Microsoft Excel Viewer
MS15-131 Microsoft Excel for Mac 2011
MS15-131 Microsoft Office 2007 Service Pack 3
MS15-131 Microsoft Office 2007 Service Pack 3
MS15-131 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-131 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-131 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-131 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-131 Microsoft Office Compatibility Pack Service Pack 3
MS15-131 Microsoft Office Compatibility Pack Service Pack 3
MS15-131 Microsoft Word 2007 Service Pack 3
MS15-131 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS15-131 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS15-131 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS15-131 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS15-131 Microsoft Word 2016 (32-bit edition)
MS15-131 Microsoft Word 2016 (64-bit edition)
MS15-131 Microsoft Word Viewer
These new vulnerability checks are included in Qualys vulnerability signature 2.3.180-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 91132
- 91136
- 91137
- 91133
- 100269
- 91138
- 91134
- 91131
- 91140
- 91139
- 91135
- 110262
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.