Executive Summary

Summary
TitleSecurity Update for Microsoft Windows to Address Remote Code Execution (3116162)
Informations
NameMS15-132First vendor Publication2015-12-08
VendorMicrosoftLast vendor Modification2015-12-08
Severity (Vendor) ImportantRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (December 8, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker accesses a local system and runs a specially crafted application.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS15-132

CWE : Common Weakness Enumeration

%idName
67 %CWE-264Permissions, Privileges, and Access Controls
33 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os4
Os2
Os2
Os2
Os1
Os1
Os2
Os4
Os1

Snort® IPS/IDS

DateDescription
2017-08-31Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43805 - Revision : 1 - Type : FILE-OFFICE
2017-08-31Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43804 - Revision : 1 - Type : FILE-OFFICE
2017-08-31Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43803 - Revision : 1 - Type : FILE-OFFICE
2017-08-31Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 43802 - Revision : 1 - Type : FILE-OFFICE
2017-06-16Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 42864 - Revision : 2 - Type : FILE-OFFICE
2017-06-16Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 42863 - Revision : 2 - Type : FILE-OFFICE
2017-05-16Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 42198 - Revision : 2 - Type : FILE-OFFICE
2017-05-16Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 42197 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office nwdblib.dll dll-load exploit attempt
RuleID : 37002 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office elsext.dll dll-load exploit attempt
RuleID : 37001 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office nwdblib.dll dll-load exploit attempt
RuleID : 37000 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office elsext.dll dll-load exploit attempt
RuleID : 36999 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office spframe.dll dll-load exploit attempt
RuleID : 36996 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office spframe.dll dll-load exploit attempt
RuleID : 36995 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 36994 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office mqrt.dll dll-load exploit attempt
RuleID : 36993 - Revision : 2 - Type : FILE-OFFICE
2016-03-14Microsoft Office wuaext.dll dll-load exploit attempt
RuleID : 36931 - Revision : 3 - Type : FILE-OFFICE
2016-03-14Microsoft Office wuaext.dll dll-load exploit attempt
RuleID : 36930 - Revision : 3 - Type : FILE-OFFICE

Metasploit Database

idDescription
2015-12-08 Office OLE Multiple DLL Side Loading Vulnerabilities

Nessus® Vulnerability Scanner

DateDescription
2015-12-08Name : The remote Windows host is affected by multiple remote code execution vulnera...
File : smb_nt_ms15-132.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
DateInformations
2015-12-09 21:30:05
  • Multiple Updates
2015-12-09 17:29:33
  • Multiple Updates
2015-12-09 13:25:15
  • Multiple Updates
2015-12-08 21:29:40
  • Multiple Updates
2015-12-08 21:16:41
  • First insertion