MS15-134: Security Update for Windows Media Center to Address Remote Code Execution (3108669)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple vulnerabilities.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by multiple vulnerabilities in the Windows Media
Center :

- An information disclosure vulnerability exists due to
improper handling of Media Center link (.mcl) files.
A remote attacker can exploit this vulnerability, via a
specially crafted .mcl link file, to disclose local file
system information. (CVE-2015-6127)

- A remote code execution vulnerability exists due to
improper handling of Media Center link (.mcl) files that
reference malicious code. A remote attacker can exploit
this vulnerability, via a compromised web page or email
that hosts a crafted .mcl file, to gain privileges and
take control of an affected system. (CVE-2015-6131)

See also :

https://technet.microsoft.com/library/security/ms15-134

Solution :

Microsoft has released a set of patches for Vista, 7, 8, and 8.1.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 87263 ()

Bugtraq ID: 78512
78516

CVE ID: CVE-2015-6127
CVE-2015-6131

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now