Executive Summary

Informations
Name CVE-2015-6042 First vendor Publication 2015-10-13
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in the CWindow object implementation in Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6042

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Snort® IPS/IDS

Date Description
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43072 - Revision : 1 - Type : BROWSER-IE
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43071 - Revision : 1 - Type : BROWSER-IE
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43070 - Revision : 1 - Type : BROWSER-IE
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43069 - Revision : 1 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36560 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36559 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 36459 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 36458 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer RegExp object use after free attempt
RuleID : 36451 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer RegExp object use after free attempt
RuleID : 36450 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CSharedStyle object out-of-bounds read attempt
RuleID : 36448 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CSharedStyle object out-of-bounds read attempt
RuleID : 36447 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer EventListener use after free attempt
RuleID : 36444 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer EventListener use after free attempt
RuleID : 36443 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Visual Basic scripting engine Filter argument mishandling attempt
RuleID : 36442 - Revision : 2 - Type : FILE-OTHER
2016-03-14 Visual Basic scripting engine Filter argument mishandling attempt
RuleID : 36441 - Revision : 2 - Type : FILE-OTHER
2016-03-14 Microsoft Internet Explorer CTableSelection use-after-free attempt
RuleID : 36440 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CTableSelection use-after-free attempt
RuleID : 36439 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer ieframe.dll ActiveX clsid access
RuleID : 36438 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer ieframe.dll ActiveX clsid access
RuleID : 36437 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36432 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36431 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36422 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36421 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36420 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36419 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Microsoft Internet Explorer CWindow object use after free attempt
RuleID : 36418 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CWindow object use after free attempt
RuleID : 36417 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36414 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36413 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36412 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36411 - Revision : 4 - Type : BROWSER-IE
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36410 - Revision : 4 - Type : OS-WINDOWS
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36409 - Revision : 4 - Type : OS-WINDOWS
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36408 - Revision : 4 - Type : OS-WINDOWS
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36407 - Revision : 4 - Type : OS-WINDOWS
2015-06-17 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 34394 - Revision : 4 - Type : BROWSER-IE
2015-06-17 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 34393 - Revision : 4 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2015-10-13 Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms15-106.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
MISC http://www.zerodayinitiative.com/advisories/ZDI-15-520
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15...
SECTRACK http://www.securitytracker.com/id/1033800

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2023-02-13 21:27:57
  • Multiple Updates
2023-02-11 21:27:45
  • Multiple Updates
2020-05-23 00:46:22
  • Multiple Updates
2018-10-13 05:18:56
  • Multiple Updates
2016-12-08 21:24:22
  • Multiple Updates
2016-12-08 09:23:50
  • Multiple Updates
2016-06-30 22:34:21
  • Multiple Updates
2016-03-17 09:24:51
  • Multiple Updates
2015-10-20 16:21:13
  • Multiple Updates
2015-10-15 05:23:22
  • Multiple Updates
2015-10-14 13:24:01
  • Multiple Updates
2015-10-14 09:23:18
  • First insertion