Executive Summary

Summary
TitleCumulative Security Update for JScript and VBScript to Address Remote Code Execution (3116178)
Informations
NameMS15-126First vendor Publication2015-12-08
VendorMicrosoftLast vendor Modification2016-05-25
Severity (Vendor) CriticalRevision1.1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.1 (May 25, 2016): Removed redundant rows from the Vulnerability Severity Rating and Maximum Security Impact by Affected Software table, and added the applicable update numbers for clarity. This is an informational change only.
Summary: This security update resolves vulnerabilities in the VBScript scripting engine in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker hosts a specially crafted website that is designed to exploit the vulnerabilities through Internet Explorer (or leverages a compromised website or a website that accepts or hosts user-provided content or advertisements) and then convinces a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that uses the Internet Explorer rendering engine to direct the user to the specially crafted website.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-126

CWE : Common Weakness Enumeration

%idName
50 %CWE-200Information Exposure
50 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application4
Application2
Application2

Snort® IPS/IDS

DateDescription
2016-03-14Microsoft Internet Explorer VBScript engine use after free attempt
RuleID : 36923 - Revision : 7 - Type : BROWSER-IE
2016-03-14Microsoft Internet Explorer VBScript engine use after free attempt
RuleID : 36922 - Revision : 7 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

DateDescription
2015-12-08Name : The remote host has a web browser installed that is affected by multiple vuln...
File : smb_nt_ms15-124.nasl - Type : ACT_GATHER_INFO
2015-12-08Name : The remote Windows host is affected by multiple vulnerabilities.
File : smb_nt_ms15-126.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
DateInformations
2016-05-26 05:34:48
  • Multiple Updates
2016-05-26 05:16:17
  • Multiple Updates
2015-12-09 21:30:02
  • Multiple Updates
2015-12-09 17:29:28
  • Multiple Updates
2015-12-09 13:25:13
  • Multiple Updates
2015-12-08 21:29:37
  • Multiple Updates
2015-12-08 21:17:06
  • First insertion