Executive Summary

Summary
TitleSecurity Update for JScript and VBScript to Address Remote Code Execution (3089659)
Informations
NameMS15-108First vendor Publication2015-10-13
VendorMicrosoftLast vendor Modification2015-10-13
Severity (Vendor) CriticalRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.0 (October 13, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in the VBScript and JScript scripting engines in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker hosts a specially crafted website that is designed to exploit the vulnerabilities through Internet Explorer (or leverages a compromised website or a website that accepts or hosts user-provided content or advertisements) and then convinces a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that uses the IE rendering engine to direct the user to the specially crafted website.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-108

CWE : Common Weakness Enumeration

%idName
50 %CWE-200Information Exposure
50 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application4
Application3
Application3

Snort® IPS/IDS

DateDescription
2017-07-04Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43072 - Revision : 1 - Type : BROWSER-IE
2017-07-04Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43071 - Revision : 1 - Type : BROWSER-IE
2017-07-04Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43070 - Revision : 1 - Type : BROWSER-IE
2017-07-04Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43069 - Revision : 1 - Type : BROWSER-IE
2016-03-14Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 36459 - Revision : 3 - Type : BROWSER-IE
2016-03-14Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 36458 - Revision : 3 - Type : BROWSER-IE
2016-03-14Microsoft Internet Explorer RegExp object use after free attempt
RuleID : 36451 - Revision : 5 - Type : BROWSER-IE
2016-03-14Microsoft Internet Explorer RegExp object use after free attempt
RuleID : 36450 - Revision : 5 - Type : BROWSER-IE
2016-03-14Visual Basic scripting engine Filter argument mishandling attempt
RuleID : 36442 - Revision : 2 - Type : FILE-OTHER
2016-03-14Visual Basic scripting engine Filter argument mishandling attempt
RuleID : 36441 - Revision : 2 - Type : FILE-OTHER
2016-03-14Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36422 - Revision : 2 - Type : POLICY-OTHER
2016-03-14Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36421 - Revision : 2 - Type : POLICY-OTHER
2016-03-14Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36420 - Revision : 2 - Type : POLICY-OTHER
2016-03-14Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36419 - Revision : 2 - Type : POLICY-OTHER
2015-06-17Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 34394 - Revision : 4 - Type : BROWSER-IE
2015-06-17Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 34393 - Revision : 4 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

DateDescription
2015-10-13Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms15-106.nasl - Type : ACT_GATHER_INFO
2015-10-13Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms15-108.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
DateInformations
2015-10-15 05:27:48
  • Multiple Updates
2015-10-14 13:24:05
  • Multiple Updates
2015-10-14 09:26:52
  • Multiple Updates
2015-10-13 21:28:15
  • Multiple Updates
2015-10-13 21:16:38
  • First insertion