Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
TitleSecurity Update for .NET Framework to Address Elevation of Privilege (3104507)
Informations
NameMS15-118First vendor Publication2015-11-10
VendorMicrosoftLast vendor Modification2016-02-09
Severity (Vendor) ImportantRevision2.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V2.0 (February 9, 2016): Revised bulletin to announce the re-release of update 3098785 to address known issues, discussed in Microsoft Knowledge Base Article 3318750, that customers who are running Windows 8.1, Windows RT, or Windows Server 2012 R2 may have experienced after installing .NET Framework 4.6 on a machine that already has a fully-updated version of .NET Framework 4.5.x. Microsoft recommends that customers scan for new updates to download, and install the re-released update 3098785. For more information see Microsoft Knowledge Base Article 3318750.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker convinces a user to navigate to a compromised website or open a link in a specially crafted email that is designed to inject client-side code into the user?s browser.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-118

CWE : Common Weakness Enumeration

%idName
67 %CWE-200Information Exposure
33 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application8

Snort® IPS/IDS

DateDescription
2017-08-31Microsoft .NET framework mscormmc.dll ASLR bypass attempt
RuleID : 43792 - Revision : 1 - Type : OS-WINDOWS
2017-08-31Microsoft .NET framework mscormmc.dll ASLR bypass attempt
RuleID : 43791 - Revision : 1 - Type : OS-WINDOWS
2016-03-14Microsoft Windows ClickOnce information disclosure attempt
RuleID : 36713 - Revision : 2 - Type : OS-WINDOWS
2016-03-14Microsoft Windows ClickOnce information disclosure attempt
RuleID : 36712 - Revision : 2 - Type : OS-WINDOWS
2014-01-10Microsoft generic javascript handler in URI XSS attempt
RuleID : 20258 - Revision : 12 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

DateDescription
2015-11-10Name : The version of the .NET Framework installed on the remote host is affected by...
File : smb_nt_ms15-118.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
DateInformations
2016-04-27 05:02:12
  • Multiple Updates
2016-02-11 08:49:11
  • Multiple Updates
2016-02-11 05:29:05
  • Multiple Updates
2016-02-11 00:29:23
  • Multiple Updates
2016-02-10 21:29:30
  • Multiple Updates
2016-02-10 17:29:08
  • Multiple Updates
2016-02-10 13:28:02
  • Multiple Updates
2016-02-10 09:29:05
  • Multiple Updates
2016-02-10 05:29:19
  • Multiple Updates
2016-02-10 00:29:18
  • Multiple Updates
2016-02-09 21:30:18
  • Multiple Updates
2016-02-09 21:17:15
  • Multiple Updates
2015-11-16 21:31:11
  • Multiple Updates
2015-11-12 21:28:44
  • Multiple Updates
2015-11-11 17:27:43
  • Multiple Updates
2015-11-11 13:26:05
  • Multiple Updates
2015-11-10 21:28:07
  • Multiple Updates
2015-11-10 21:16:34
  • First insertion