MS15-039: Vulnerability in XML Core Services Could Allow Security Feature Bypass (3046482)

medium Nessus Plugin ID 82775
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is affected by a security bypass vulnerability.


The remote host contains a version of Microsoft XML Core Services (MSXML) that is affected by a same-origin policy security bypass vulnerability. A remote attacker can exploit this vulnerability by convincing a user to click a specially crafted link, resulting in the disclosure of sensitive user information, such as credentials and arbitrary files.


Microsoft has released a set of patches for Windows 2003, Vista, 2008, 7, and 2008 R2.

See Also

Plugin Details

Severity: Medium

ID: 82775

File Name: smb_nt_ms15-039.nasl

Version: 1.9

Type: local

Agent: windows

Published: 4/14/2015

Updated: 11/15/2018

Dependencies: smb_hotfixes.nasl, ms_bulletin_checks_possible.nasl

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:xml_core_services, cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 4/14/2015

Vulnerability Publication Date: 4/14/2015

Reference Information

CVE: CVE-2015-1646

BID: 74009

MSFT: MS15-039

MSKB: 3046482