VID |
26740 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS15-124, 3116180) for 'Cumulative Security Update for Internet Explorer' has not been applied. This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Multiple Internet Explorer Memory Corruption Vulnerabilities Multiple remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Multiple Microsoft Browser XSS Filter Bypass Vulnerabilities Multiple XSS filter bypass vulnerabilities exist in the way that Internet Explorer disables an HTML attribute in otherwise appropriately filtered HTTP response data. The vulnerabilities could allow initially disabled scripts to run in the wrong security context, leading to information disclosure.
Scripting Engine Information Disclosure Vulnerability - CVE-2015-6135 An information disclosure vulnerability exists when VBScript improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data.
Scripting Engine Memory Corruption Vulnerability - CVE-2015-6136 A remote code execution vulnerability exists in the way that the VBScript engine renders when handling objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Microsoft Browser Elevation of Privilege Vulnerability - CVE-2015-6139 An elevation of privilege vulnerability exists when Internet Explorer does not properly enforce content types. An attacker who successfully exploited the vulnerability could run arbitrary script with elevated privileges.
Internet Explorer Information Disclosure Vulnerability - CVE-2015-6157 An information disclosure vulnerability exists when Internet Explorer improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could provide the attacker with information to further compromise the user's system.
Internet Explorer ASLR Bypass - CVE-2015-6161 A security feature bypass for Internet Explorer exists as a result of how exceptions are handled when dispatching certain window messages, allowing an attacker to probe the layout of the address space and thereby bypassing Address Space Layout Randomization (ASLR). By itself, the ASLR bypass does not allow arbitrary code execution. However, an attacker could use this ASLR bypass in conjunction with another vulnerability, such as a remote code execution vulnerability, to run arbitrary code on a target system. Successful exploitation of the ASLR bypass requires a user to be logged on and running an affected version of Internet Explorer. The user would then need to browse to a malicious site.
Internet Explorer XSS Filter Bypass Vulnerability - CVE-2015-6164 A security feature bypass vulnerability exists when Internet Explorer does not properly enforce cross-domain policies. The vulnerability could allow an attacker to access information from one domain and inject it into another domain.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://technet.microsoft.com/en-us/library/security/ms15-124
* Platforms Affected: Internet Explorer 7 Internet Explorer 8 Internet Explorer 9 Internet Expl |
Recommendation |
Apply the appropriate patch(3116180) for your system, as listed in Microsoft Security Bulletin MS15-124 at https://technet.microsoft.com/en-us/library/security/ms15-124 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2015-6083,CVE-2015-6134,CVE-2015-6135,CVE-2015-6136,CVE-2015-6138,CVE-2015-6139,CVE-2015-6140,CVE-2015-6141,CVE-2015-6142,CVE-2015-6143 (CVE) |
Related URL |
78481,78482,78483,78484,78485,78486,78487,78488,78489,78490,78491,78492,78494,78495,78507 (SecurityFocus) |
Related URL |
(ISS) |
|