KLA10674
Multiple vulnerabilities in Microsoft Windows

Updated: 09/26/2023
Detect date
?
10/12/2015
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Improper information disclosing at Edge can be exploited remotely to obtain sensitive information;
  2. Improper HTML restrictions at Edge can be exploited remotely to bypass XSS filter;
  3. Improper memory objects handling at Windows Shell can be exploited remotely via a specially designed toolbar object to execute arbitrary code;
  4. Improper memory object handling at Microsoft Tablet Input Band can be exploited remotely via a specially designed website to execute arbitrary code;
  5. Improper memory objects handling at windows kernel can be exploited locally via a specially designed application execute arbitrary code;
  6. Improper policy enforcement at Windows Trusted Boot can be exploited locally via a specially designed Boot Configuration Data to bypass security restrictions;
  7. Improper validation at mount points creation can be exploited remotely via a specially designed application to gain privileges.

Technical details

Vulnerability (4) could also be exploited remotely via malicious web site.

(6) could lead to bypass of Trusted Boot integrity validation for BitLocker and Device encryption security features.

Affected products

Microsoft Windows Vista Service Pack 2
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows 7 Service Pack 1
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows RT
Microsoft Windows RT 8.1
Microsoft Windows 10

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2015-2549
CVE-2015-2548
CVE-2015-2553
CVE-2015-6057
CVE-2015-2515
CVE-2015-2554
CVE-2015-2550
CVE-2015-2552
CVE-2015-6058

Impacts
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Related products
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
?
CVE-2015-25497.2High
CVE-2015-25489.3Critical
CVE-2015-25537.2High
CVE-2015-60575.0Critical
CVE-2015-25159.3Critical
CVE-2015-25547.2High
CVE-2015-25507.2High
CVE-2015-25527.2High
CVE-2015-60584.3Warning
Microsoft official advisories
Microsoft Security Update Guide
KB list

3097617
3096447
3088195
3096443
3093513
3096448
3080446

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Find out the statistics of the vulnerabilities spreading in your region