Executive Summary

Summary
TitleSecurity Update for Microsoft Graphics Component to Address Remote Code Execution (3104503)
Informations
NameMS15-128First vendor Publication2015-12-08
VendorMicrosoftLast vendor Modification2016-02-09
Severity (Vendor) CriticalRevision1.1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.1 (February 9, 2016): Revised bulletin to correct the updates replaced for .NET Framework 3.5.1 installed on supported editions of Windows 7 and Windows Server 2008 R2. This is an informational change only. There were no changes to the update files. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves vulnerabilities in Microsoft Windows, .NET Framework, Microsoft Office, Skype for Business, Microsoft Lync, and Silverlight. The vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a webpage that contains specially crafted embedded fonts.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-128

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application8
Application1
Application4
Application4
Application1
Application1
Application2
Os2
Os2
Os1
Os1
Os1
Os1
Os3
Os2
Os1

Snort® IPS/IDS

DateDescription
2016-03-14Microsoft Office Word OGL module out of bounds read attempt
RuleID : 36967 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office Word OGL module out of bounds read attempt
RuleID : 36966 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office Word gdiplus integer overflow attempt
RuleID : 36965 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office Word gdiplus integer overflow attempt
RuleID : 36964 - Revision : 2 - Type : FILE-OFFICE

Nessus® Vulnerability Scanner

DateDescription
2015-12-08Name : A multimedia application framework installed on the remote Mac OS X host is a...
File : macosx_ms15-128.nasl - Type : ACT_GATHER_INFO
2015-12-08Name : The remote host is affected by multiple remote code execution vulnerabilities.
File : smb_nt_ms15-128.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
DateInformations
2017-09-13 09:25:17
  • Multiple Updates
2016-04-27 05:02:39
  • Multiple Updates
2016-02-11 08:49:11
  • Multiple Updates
2016-02-11 05:29:06
  • Multiple Updates
2016-02-11 00:29:24
  • Multiple Updates
2016-02-10 21:29:30
  • Multiple Updates
2016-02-10 17:29:09
  • Multiple Updates
2016-02-10 13:28:02
  • Multiple Updates
2016-02-10 09:29:05
  • Multiple Updates
2016-02-10 05:29:20
  • Multiple Updates
2016-02-10 00:29:19
  • Multiple Updates
2016-02-09 21:30:18
  • Multiple Updates
2016-02-09 21:17:20
  • Multiple Updates
2015-12-10 00:27:41
  • Multiple Updates
2015-12-09 17:29:30
  • Multiple Updates
2015-12-09 13:25:14
  • Multiple Updates
2015-12-08 21:29:38
  • Multiple Updates
2015-12-08 21:17:14
  • First insertion