MS15-109: Security Update for Windows Shell to Address Remote Code Execution (3096443)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple remote code execution
vulnerabilities.

Description :

The remote Windows host is affected by the following vulnerabilities :

- A remote code execution vulnerability exists in the
Windows shell due to improper handling of objects in
memory. A remote attacker can exploit this vulnerability
by convincing a user to open a specially crafted toolbar
object, resulting in the execution of arbitrary code in
the context of the current user. (CVE-2015-2515)

- A privilege escalation vulnerability exists in the
Microsoft Tablet Input Band due to improper handling of
objects in memory. A remote attacker can exploit this
vulnerability to gain the same user rights as the
current user by convincing a user to visit a specially
crafted website. (CVE-2015-2548)

See also :

https://technet.microsoft.com/library/security/MS15-109

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, 2012, 8.1, 2012 R2, and 10.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 86366 ()

Bugtraq ID: 76981
76989

CVE ID: CVE-2015-2515
CVE-2015-2548

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now