MS15-097: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (3089656)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple vulnerabilities.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by multiple vulnerabilities :

- An elevation of privilege vulnerability exists in the
Windows Adobe Type Manager Library due to improper
handling of specially crafted OpenType fonts. An
authenticated, remote attacker can exploit this
vulnerability, via a specially crafted application, to
elevate privileges and execute arbitrary code.
(CVE-2015-2506)

- Multiple elevation of privilege vulnerabilities exist in
the Windows Adobe Type Manager Library due to improper
handling of objects in memory. A local attacker can
exploit these vulnerabilities, via a specially crafted
application, to execute arbitrary code. (CVE-2015-2507,
CVE-2015-2508, CVE-2015-2512)

- A remote code execution vulnerability exists in
components of Windows, Office, and Lync due to improper
handling of specially crafted OpenType fonts. An
unauthenticated, remote attacker can exploit this
vulnerability by convincing a user to open a file or
visit a website containing specially crafted OpenType
fonts, resulting in execution of arbitrary code in the
context of the current user. (CVE-2015-2510)

- Multiple elevation of privilege vulnerabilities exist in
the Windows kernel-mode driver due to improper handling
of objects in memory. A local attacker can exploit these
vulnerabilities, via a specially crafted application, to
execute arbitrary code in kernel mode. (CVE-2015-2511,
CVE-2015-2517, CVE-2015-2518, CVE-2015-2546)

- An elevation of privilege vulnerability exists in the
Windows kernel-mode driver due to improper validation
and enforcement of integrity levels during certain
process initialization scenarios. A local attacker can
exploit this vulnerability, via a specially crafted
application, to execute arbitrary code in kernel mode.
(CVE-2015-2527)

- A security feature bypass vulnerability exists due to
a failure by the Windows kernel to properly initialize a
memory address. A local attacker can exploit this, via a
specially crafted application, to bypass Kernel Address
Space Layout Randomization (KASLR) and retrieve the base
address of the kernel driver. (CVE-2015-2529)

See also :

https://technet.microsoft.com/en-us/library/ms15-097.aspx

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2, and 10. Additionally,
Microsoft has released a set of patches for Office 2007, Office 2010,
Lync 2010, Lync 2010 Attendee, Lync 2013 (Skype for Business), Lync
Basic 2013, and Live Meeting 2007.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now