Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Security Update for .NET Framework to Address Elevation of Privilege (3104507)
Informations
Name MS15-118 First vendor Publication 2015-11-10
Vendor Microsoft Last vendor Modification 2016-02-09
Severity (Vendor) Important Revision 2.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V2.0 (February 9, 2016): Revised bulletin to announce the re-release of update 3098785 to address known issues, discussed in Microsoft Knowledge Base Article 3318750, that customers who are running Windows 8.1, Windows RT, or Windows Server 2012 R2 may have experienced after installing .NET Framework 4.6 on a machine that already has a fully-updated version of .NET Framework 4.5.x. Microsoft recommends that customers scan for new updates to download, and install the re-released update 3098785. For more information see Microsoft Knowledge Base Article 3318750.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker convinces a user to navigate to a compromised website or open a link in a specially crafted email that is designed to inject client-side code into the user?s browser.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-118

CWE : Common Weakness Enumeration

% Id Name
67 % CWE-200 Information Exposure
33 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

Snort® IPS/IDS

Date Description
2017-08-31 Microsoft .NET framework mscormmc.dll ASLR bypass attempt
RuleID : 43792 - Revision : 1 - Type : OS-WINDOWS
2017-08-31 Microsoft .NET framework mscormmc.dll ASLR bypass attempt
RuleID : 43791 - Revision : 1 - Type : OS-WINDOWS
2016-03-14 Microsoft Windows ClickOnce information disclosure attempt
RuleID : 36713 - Revision : 3 - Type : OS-WINDOWS
2016-03-14 Microsoft Windows ClickOnce information disclosure attempt
RuleID : 36712 - Revision : 2 - Type : OS-WINDOWS
2014-01-10 Microsoft generic javascript handler in URI XSS attempt
RuleID : 20258 - Revision : 12 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2015-11-10 Name : The version of the .NET Framework installed on the remote host is affected by...
File : smb_nt_ms15-118.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Date Informations
2016-04-27 05:02:12
  • Multiple Updates
2016-02-11 08:49:11
  • Multiple Updates
2016-02-11 05:29:05
  • Multiple Updates
2016-02-11 00:29:23
  • Multiple Updates
2016-02-10 21:29:30
  • Multiple Updates
2016-02-10 17:29:08
  • Multiple Updates
2016-02-10 13:28:02
  • Multiple Updates
2016-02-10 09:29:05
  • Multiple Updates
2016-02-10 05:29:19
  • Multiple Updates
2016-02-10 00:29:18
  • Multiple Updates
2016-02-09 21:30:18
  • Multiple Updates
2016-02-09 21:17:15
  • Multiple Updates
2015-11-16 21:31:11
  • Multiple Updates
2015-11-12 21:28:44
  • Multiple Updates
2015-11-11 17:27:43
  • Multiple Updates
2015-11-11 13:26:05
  • Multiple Updates
2015-11-10 21:28:07
  • Multiple Updates
2015-11-10 21:16:34
  • First insertion