Executive Summary

Summary
TitleVulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365)
Informations
NameMS15-006First vendor Publication2015-01-13
VendorMicrosoftLast vendor Modification2015-07-22
Severity (Vendor) ImportantRevision2.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score1.9Attack RangeLocal
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score3.4AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V2.0 (July 22, 2015): Bulletin revised to inform customers of the July 14, 2015 reoffering of the 3004365 update for Windows 8.1 and Windows Server 2012 R2 systems. The update provides defense-in-depth measures beyond what was provided in the original update issued on January 13, 2015. Customers running these operating systems who have already successfully applied the update should reinstall the update to be best protected from the vulnerability discussed in this bulletin.
Summary: This security update resolves a privately reported vulnerability in Windows Error Reporting (WER). The vulnerability could allow security feature bypass if successfully exploited by an attacker. An attacker who successfully exploited this vulnerability could gain access to the memory of a running process. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-006

CWE : Common Weakness Enumeration

%idName
100 %CWE-264Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28634
 
Oval ID: oval:org.mitre.oval:def:28634
Title: Windows Error Reporting security feature bypass vulnerability - CVE-2015-0001 (MS15-006)
Description: The Windows Error Reporting (WER) component in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass the Protected Process Light protection mechanism and read the contents of arbitrary process-memory locations by leveraging administrative privileges, aka "Windows Error Reporting Security Feature Bypass Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-0001
Version: 3
Platform(s): Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1
Os1
Os1
Os1
Os2

Information Assurance Vulnerability Management (IAVM)

DateDescription
2015-01-15IAVM : 2015-B-0005 - Microsoft Windows Error Reporting (WER) Security Bypass Vulnerability (MS15-006)
Severity : Category II - VMSKEY : V0058197

Nessus® Vulnerability Scanner

DateDescription
2015-01-13Name : The remote Windows host is affected by a security feature bypass vulnerability.
File : smb_nt_ms15-006.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
DateInformations
2015-10-18 17:26:26
  • Multiple Updates
2015-07-22 21:28:27
  • Multiple Updates
2015-07-22 21:16:32
  • Multiple Updates
2015-01-22 00:25:59
  • Multiple Updates
2015-01-22 00:15:53
  • Multiple Updates
2015-01-15 05:28:41
  • Multiple Updates
2015-01-14 13:23:38
  • Multiple Updates
2015-01-14 05:29:31
  • Multiple Updates
2015-01-13 21:27:50
  • Multiple Updates
2015-01-13 21:18:12
  • First insertion