MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure (3080129)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple information disclosure
vulnerabilities.

Description :

The remote Windows host contains a version of Microsoft XML Core
Services (MSXML) that is affected by multiple information disclosure
vulnerabilities :

- An information disclosure vulnerability exists in XML
Core Services (MSXML) due to the use of Secure Sockets
Layer (SSL) 2.0. A man-in-the-middle attacker can
exploit this vulnerability by forcing an encrypted SSL
2.0 session and then decrypting the resulting network
traffic. (CVE-2015-2434, CVE-2015-2471)

- An information disclosure vulnerability exists in XML
Core Services (MSXML) due to exposing sensitive memory
addresses. A remote attacker, using a specially crafted
website, can exploit this to bypass ASLR and gain access
to private data. (CVE-2015-2440)

See also :

https://technet.microsoft.com/en-us/library/security/ms15-084.aspx

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, 2012, 8.1, 2012 R2, RT, RT 8.1, Office 2007 SP3, and
InfoPath 2007 SP3.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 85335 ()

Bugtraq ID: 76229
76232
76257

CVE ID: CVE-2015-2434
CVE-2015-2440
CVE-2015-2471

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now