MS15-115: Security Update for Microsoft Windows to Address Remote Code Execution (3105864)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host is affected by multiple vulnerabilities.

Description :

The remote Windows host is affected by the following vulnerabilities :

- Multiple elevation of privilege vulnerabilities exist
that are related to the handling of objects in memory.
A local attacker can exploit these, via a crafted
application, to run arbitrary code in kernel mode.
(CVE-2015-6100, CVE-2015-6101)

- Multiple information disclosure vulnerabilities exist
due to a failure to properly initialize memory
addresses. A local attacker can exploit these, via a
specially crafted application, to bypass the Kernel
Address Space Layout Randomization (KASLR) and retrieve
the base address of the Kernel driver from a compromised
process. (CVE-2015-6102, CVE-2015-6109)

- Multiple remote code execution vulnerabilities exist
in the Adobe Type Manager Library due to improper
handling of specially crafted fonts. An unauthenticated,
remote attacker can exploit these, via a crafted
document or web page, to execute arbitrary code.
(CVE-2015-6103, CVE-2015-6104)

- A security feature bypass vulnerability exists due to
improper validation of permissions. A local attacker can
exploit this to interact with the file system in an
inappropriate manner to modify files, by using a
crafted, low-integrity-level, user-mode application.

See also :

Solution :

Microsoft has released a set of patches for Vista, 2008, 7, 2008 R2,
8, 2012, 8.1, 2012 R2, and 10.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 86822 ()

Bugtraq ID: 77458

CVE ID: CVE-2015-6100

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now