Skip to main content

Microsoft Security Bulletin Coverage (August 11, 2015)

Microsoft has released security advisories as usual for month of August, 2015.

You security devices, OS and Application should able to prevent below CVE ID. Otherwise, please patch first.

If you are using Dell SonicWall Security Devices in your premises, then they all are patched.


MS15-079 
Cumulative Security Update fro Internet Explorer

  • CVE-2015-2423 Unsafe Command Line Parameter Passing Vulnerability
    This is a local vulnerability.
  • CVE-2015-2441 Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2442 Memory Corruption Vulnerability
    IPS: 11076 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 1"
  • CVE-2015-2443 Memory Corruption Vulnerability
    IPS: 11077 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 2"
  • CVE-2015-2444 Memory Corruption Vulnerability
    IPS: 11078 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 3"
  • CVE-2015-2445 ASLR Bypass
    There are no known exploits in the wild.
  • CVE-2015-2446 Memory Corruption Vulnerability
    IPS: 11079 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 4"
  • CVE-2015-2447 Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2448 Memory Corruption Vulnerability
    IPS: 11080 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 5"
  • CVE-2015-2449 ASLR Bypass
    There are no known exploits in the wild.
  • CVE-2015-2450 Memory Corruption Vulnerability
    IPS: 11081 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 6"
  • CVE-2015-2451 Memory Corruption Vulnerability
    IPS: 11083 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 8"
  • CVE-2015-2452 Memory Corruption Vulnerability
    IPS: 11082 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 7"
MS15-080 Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution

  • CVE-2015-2431 Microsoft Office Graphics Component Remote Code Execution Vulnerability
    SPY: 4276 "Malformed-File doc.MP.30"
  • CVE-2015-2432 OpenType Font Parsing Vulnerability
    SPY: 3148 "Malformed-File otf.MP.12"
  • CVE-2015-2433 Kernel ASLR Bypass Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2435 TrueType Font Parsing Vulnerability
    SPY: 4232 "Malformed-File ttf.MP.4"
  • CVE-2015-2453 Windows CSRSS Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2454 Windows KMD Security Feature Bypass Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2455 TrueType Font Parsing Vulnerability
    SPY: 4209 "Malformed-File ttf.MP.3"
  • CVE-2015-2456 TrueType Font Parsing Vulnerability
    SPY: 3149 " Malformed-File otf.MP.13 "
  • CVE-2015-2458 OpenType Font Parsing Vulnerability
    SPY: 3150 " Malformed-File otf.MP.14 "
  • CVE-2015-2459 OpenType Font Parsing Vulnerability
    SPY: 3151 " Malformed-File otf.MP.15 "
  • CVE-2015-2460 OpenType Font Parsing Vulnerability
    SPY: 3152 " Malformed-File otf.MP.16 "
  • CVE-2015-2461 OpenType Font Parsing Vulnerability
    SPY: 3153 " Malformed-File otf.MP.17 "
  • CVE-2015-2462 OpenType Font Parsing Vulnerability
    SPY: 3157 " Malformed-File otf.MP.20 "
  • CVE-2015-2463 TrueType Font Parsing Vulnerability
    SPY: 3155 " Malformed-File otf.MP.18 "
  • CVE-2015-2464 TrueType Font Parsing Vulnerability
    SPY: 3156 " Malformed-File otf.MP.19 "
  • CVE-2015-2465 Windows Shell Security Feature Bypass Vulnerability
    There are no known exploits in the wild.
MS15-081 Vulnerability in Microsoft Office Could Allow Remote Code Execution

  • CVE-2015-1642 Microsoft Office Memory Corruption Vulnerability
    SPY: 4366 "Malformed-File docx.MP.5"
  • CVE-2015-2423 Unsafe Command Line Parameter Passing Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2466 Microsoft Office Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2467 Microsoft Office Memory Corruption Vulnerability
    SPY: 3159 "Malformed-File doc.MP.25"
  • CVE-2015-2468 Microsoft Office Memory Corruption Vulnerability
    SPY: 3160 "Malformed-File doc.MP.26"
  • CVE-2015-2469 Microsoft Office Memory Corruption Vulnerability
    SPY: 3365 "Malformed-File doc.MP.27"
  • CVE-2015-2470 Microsoft Office Integer Underflow Vulnerability
    SPY: 4193 " Malformed-File doc.MP.28"
  • CVE-2015-2477 Microsoft Office Memory Corruption Vulnerability
    SPY: 4195 "Malformed-File doc.MP.29"
MS15-082 Vulnerabilities in RDP Could Allow Remote Code Execution 

  • CVE-2015-2472 Remote Desktop Session Host Spoofing Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2473 Remote Desktop Protocol DLL Planting Remote Code Execution Vulnerability
    There are no known exploits in the wild.
MS15-083 Vulnerabilities in Server Message Block Could Allow Remote Code Execution 

  • CVE-2015-2474 Server Message Block Memory Corruption Vulnerability
    There are no known exploits in the wild.
MS15-084 Vulnerability in XML Core Services Could Allow Elevation of Privilege 

  • CVE-2015-2434 MSXML Information Disclosure Vulnerability
    IPS: 5770 "Downgraded TLS Traffic"
  • CVE-2015-2440 MSXML Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2471 MSXML Information Disclosure Vulnerability
    IPS: 5770 "Downgraded TLS Traffic"
MS15-085 Vulnerability in Mount Manager Could Allow Elevation of Privilege 

  • CVE-2015-1769 Mount Manager Elevation of Privilege Vulnerability
    This is a local vulnerability.
MS15-086 Vulnerability in System Center Operations Manager Could Allow Elevation of Privilege 

  • CVE-2015-2420 System Center Operations Manager Web Console XSS Vulnerability
    There are no known exploits in the wild.
MS15-087 Vulnerability in UDDI Services Could Allow Elevation of Privilege 

  • CVE-2015-2475 UDDI Services Could Allow Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
MS15-088 Unsafe Command Line Parameter Passing Could Allow Information Disclosure 

  • CVE-2015-2423 Unsafe Command Line Parameter Passing Vulnerability
    This is a local vulnerability.
MS15-089 Vulnerabilities in WebDAV Could Allow Information Disclosure 

  • CVE-2015-2476 WebDAV Client Information Disclosure Vulnerability
    IPS: 5770 "Downgraded TLS Traffic"
MS15-090 Vulnerability in Microsoft Windows Could Allow Elevation of Privilege 

  • CVE-2015-2428 Windows Object Manager Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2429 Windows Registry Elevation of Privilege Vulnerability
    This is a local vulnerability.
  • CVE-2015-2430 Windows Filesystem Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
MS15-091 Cumulative Security Update for Microsoft Edge 

  • CVE-2015-2441 Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2442 Memory Corruption Vulnerability
    IPS: 11076 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 1"
  • CVE-2015-2446 Memory Corruption Vulnerability
    IPS: 11079 "Internet Explorer Memory Corruption Vulnerability (MS15-079) 4"
  • CVE-2015-2449 ASLR Bypass
    There are no known exploits in the wild.
MS15-092 Vulnerabilities in .NET Framework Could Allow Elevation of Privilege 

  • CVE-2015-2479 RyuJIT Optimization Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2480 RyuJIT Optimization Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2481 RyuJIT Optimization Elevation of Privilege Vulnerability
    There are no known exploits in the wild.



Have a good time.
(Be knowledgeable, pass it on then)

Comments

Popular posts from this blog

Fortigate guide for Begineer - 6

I would like to explaine how to troubleshoot the Fortigate Unit configured by Transparent Mode in step by step this time. Let's assume, you have one Fortigate Unit that configured as Transparent Mode. But devices from Internal/Private Network unable to access Internet/Public Network through your Fortigate Unit. OK. Let's troubleshoot with following steps, 1) Check the physical network connections between the network and the FortiGate unit, and between the FortiGate unit and the Internet. 2) Check the router and ISP-supplied equipment to make sure it is operating correctly. 3) Verify that you can connect to the internal interface by connecting to the management IP address of the FortiGate unit from the Internal network. From the internal network, attempt to ping the management IP address. If you cannot connect to the internal interface, verify the IP configuration of the PC and make sure the cables are connected and all switches and other devices on the network are powered on a

Solving the "A general system error occured:Invalid fault" error in vSphere 4

Below error was come out when you try to migrate VM to other host for some reason. Below error was come out when you try to edit VM setting. Below error was come out when you power on the VM. How to solve those error? Here is how I resolve the error! Login to the Host that errored VM exist by using Terminal or Direct Console. Enter below command and press enter. services.sh restart Wait until all VMware Services are restarted. After that try to Power On/Edit Settings or Migrate the errored VM and you will see all you can do without any error pop-up. This kind of errors can occur if you shutdown/restart VM unproperly or shutdown/restart the Host unproperly that VM exist. You can check log file deeply if you willing to know precisely on this. May you all be happy. (Be knowledgeable, pass it on then)

Link Aggregating with Synology NAS and Cisco Switch

I’d like to share how to setup Link Aggregating between Synology NAS and Cisco Switch. I’ve got one Synology NAS with 4 Network Ports and I’m going to use 2 of them. Both Network Port to be as one Logical Link, Fault Tolerance and Load Balancing. To do that, I need to configure Link Aggregating on Synology NAS and EtherChannel with LACP on Cisco Switch. Below is brief steps to do to meet with my requirements. - Get connected Synology NAS and Cisco Switch as shown in picture. - Bonding two Network Ports of Synology NAS and assign IP Address - Configure EtherChannel with LACP in Cisco Switch and add two physical ports as Member. OK. Let’s begin from Synology NAS. - Login to the Synology and go to Control Panel>Network>Create>Create Bond - Select IEEE 802.3ad to get Fault Tolerance and Load Balancing Featureyou’re your switch not support 802.3ad you can only select Fault Tolerance only feature). After that click “Next”. - Choose the network port f