Executive Summary

Summary
TitleVulnerability in XML Core Services Could Allow Security Feature Bypass (3046482)
Informations
NameMS15-039First vendor Publication2015-04-14
VendorMicrosoftLast vendor Modification2015-04-14
Severity (Vendor) ImportantRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (April 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if a user opens a specially crafted file. In all cases, however, an attacker would have no way to force users to open the specially crafted file; an attacker would have to convince users to open the file, typically by way of an enticement in an email or Instant Messenger message.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-039

CWE : Common Weakness Enumeration

%idName
100 %CWE-264Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:29009
 
Oval ID: oval:org.mitre.oval:def:29009
Title: MSXML3 same origin policy SFB vulnerability - CVE-2015-1646 (MS15-039)
Description: Microsoft XML Core Services (aka MSXML) 3.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted DTD, aka "MSXML3 Same Origin Policy SFB Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2015-1646
Version: 4
Platform(s): Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Server 2008 R2
Product(s): Microsoft XML Core Services 3.0
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Snort® IPS/IDS

DateDescription
2015-05-14Multiple products external entity injection attempt
RuleID : 34098 - Revision : 6 - Type : FILE-OTHER
2015-05-14Multiple products external entity injection attempt
RuleID : 34097 - Revision : 6 - Type : FILE-OTHER

Nessus® Vulnerability Scanner

DateDescription
2015-04-14Name : The remote host is affected by a security bypass vulnerability.
File : smb_nt_ms15-039.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
DateInformations
2016-06-30 22:38:06
  • Multiple Updates
2015-05-14 21:26:35
  • Multiple Updates
2015-04-16 05:30:18
  • Multiple Updates
2015-04-15 13:28:35
  • Multiple Updates
2015-04-15 05:31:36
  • Multiple Updates
2015-04-14 21:30:22
  • Multiple Updates
2015-04-14 21:16:30
  • First insertion