Executive Summary

Summary
Title Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365)
Informations
Name MS15-006 First vendor Publication 2015-01-13
Vendor Microsoft Last vendor Modification 2015-07-22
Severity (Vendor) Important Revision 2.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score 1.9 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V2.0 (July 22, 2015): Bulletin revised to inform customers of the July 14, 2015 reoffering of the 3004365 update for Windows 8.1 and Windows Server 2012 R2 systems. The update provides defense-in-depth measures beyond what was provided in the original update issued on January 13, 2015. Customers running these operating systems who have already successfully applied the update should reinstall the update to be best protected from the vulnerability discussed in this bulletin.
Summary: This security update resolves a privately reported vulnerability in Windows Error Reporting (WER). The vulnerability could allow security feature bypass if successfully exploited by an attacker. An attacker who successfully exploited this vulnerability could gain access to the memory of a running process. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-006

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28634
 
Oval ID: oval:org.mitre.oval:def:28634
Title: Windows Error Reporting security feature bypass vulnerability - CVE-2015-0001 (MS15-006)
Description: The Windows Error Reporting (WER) component in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass the Protected Process Light protection mechanism and read the contents of arbitrary process-memory locations by leveraging administrative privileges, aka "Windows Error Reporting Security Feature Bypass Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-0001
Version: 3
Platform(s): Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 1
Os 1
Os 2

Information Assurance Vulnerability Management (IAVM)

Date Description
2015-01-15 IAVM : 2015-B-0005 - Microsoft Windows Error Reporting (WER) Security Bypass Vulnerability (MS15-006)
Severity : Category II - VMSKEY : V0058197

Nessus® Vulnerability Scanner

Date Description
2015-01-13 Name : The remote Windows host is affected by a security feature bypass vulnerability.
File : smb_nt_ms15-006.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2015-10-18 17:26:26
  • Multiple Updates
2015-07-22 21:28:27
  • Multiple Updates
2015-07-22 21:16:32
  • Multiple Updates
2015-01-22 00:25:59
  • Multiple Updates
2015-01-22 00:15:53
  • Multiple Updates
2015-01-15 05:28:41
  • Multiple Updates
2015-01-14 13:23:38
  • Multiple Updates
2015-01-14 05:29:31
  • Multiple Updates
2015-01-13 21:27:50
  • Multiple Updates
2015-01-13 21:18:12
  • First insertion