Skip to main content

Microsoft Security Bulletin Coverage (July 14, 2015)

As usual, Microsoft has released security advisories for Month of July, 2015.
So, you have to check that your Security Devices are able to protect below CVE ID or not.
If you are using Dell SonicWall Security Products and they are set to download patches automatically, then no need to worry because of SonicWall Security Team already released the patches to cover these vulnerabilities.
If your devices are not auto-update, then patch them manually.
Check below CVE ID for your reference and awareness,

MS15-058 Vulnerabilities in SQL Server Could Allow Remote Code Execution
  • CVE-2015-1761 SQL Server Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-1762 SQL Server Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-1763 SQL Server Remote Code Execution Vulnerability
    There are no known exploits in the wild.
MS15-065 Security Update for Internet Explorer 
  • CVE-2015-1729 Internet Explorer Information Disclosure Vulnerability
    IPS: 5962 "Internet Explorer Cross-domain Information Disclosure (MS14-065) 2"
  • CVE-2015-1733 Internet Explorer Memory Corruption Vulnerability
    IPS: 11026 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 10"
  • CVE-2015-1738 Internet Explorer Memory Corruption Vulnerability
    IPS: 11027 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 11"
  • CVE-2015-1767 Internet Explorer Memory Corruption Vulnerability
    IPS: 11028 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 12"
  • CVE-2015-2372 VBScript Memory Corruption Vulnerability
    IPS: 11029 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 13"
  • CVE-2015-2383 Internet Explorer Memory Corruption Vulnerability
    IPS: 11030 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 14"
  • CVE-2015-2384 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2385 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2388 Internet Explorer Memory Corruption Vulnerability
    IPS: 11031 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 15"
  • CVE-2015-2389 Internet Explorer Memory Corruption Vulnerability
    IPS: 11032 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 16"
  • CVE-2015-2390 Internet Explorer Memory Corruption Vulnerability
    IPS: 11033 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 17"
  • CVE-2015-2391 Internet Explorer Memory Corruption Vulnerability
    IPS: 11034 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 18"
  • CVE-2015-2397 Internet Explorer Memory Corruption Vulnerability
    IPS: 7638 "DOM Object Use-After-Free Attack 2"
  • CVE-2015-2398 Internet Explorer XSS Filter Bypass Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2401 Internet Explorer Memory Corruption Vulnerability
    IPS: 11036 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 20"
  • CVE-2015-2402 Internet Explorer Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2403 Internet Explorer Memory Corruption Vulnerability
    IPS: 2175 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 1"
  • CVE-2015-2404 Internet Explorer Memory Corruption Vulnerability
    IPS: 2190 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 2"
  • CVE-2015-2406 Internet Explorer Memory Corruption Vulnerability
    IPS: 2191 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 3"
  • CVE-2015-2408 Internet Explorer Memory Corruption Vulnerability
    IPS: 2192 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 4"
  • CVE-2015-2410 Internet Explorer Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2411 Internet Explorer Memory Corruption Vulnerability
    IPS: 2198 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 5"
  • CVE-2015-2412 Internet Explorer Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2413 Internet Explorer Information Disclosure Vulnerability
    IPS: 2207 "Internet Explorer Information Disclosure Vulnerability (MS15-065) 1"
  • CVE-2015-2414 Internet Explorer Information Disclosure Vulnerability
    IPS: 2208 "Internet Explorer Information Disclosure Vulnerability (MS15-065) 2"
  • CVE-2015-2419 Jscript9 Memory Corruption Vulnerability
    IPS: 2209 "Internet Explorer JScript9 Memory Corruption Vulnerability (MS15-065)"
  • CVE-2015-2421 Internet Explorer ASLR Bypass
    IPS: 2210 "Internet Explorer ASLR Bypass Vulnerability (MS15-065)"
  • CVE-2015-2422 Internet Explorer Memory Corruption Vulnerability
    IPS: 2233 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 6"
  • CVE-2015-2425 Internet Explorer Memory Corruption Vulnerability
    IPS: 2234 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 7"
  • CVE-2015-2372 VBScript Memory Corruption Vulnerability
    IPS: 11029 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 13"
  • CVE-2015-2398 Internet Explorer XSS Filter Bypass Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2402 Internet Explorer Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2419 Jscript9 Memory Corruption Vulnerability
    IPS: 2209 "Internet Explorer JScript9 Memory Corruption Vulnerability (MS15-065)"
  • CVE-2015-2421 Internet Explorer ASLR Bypass
    IPS: 2210 "Internet Explorer ASLR Bypass Vulnerability (MS15-065)"
MS15-066 Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution
  • CVE-2015-2372 VBScript Memory Corruption Vulnerability
    There are no known exploits in the wild.
MS15-067 Vulnerability in RDP Could Allow Remote Code Execution 
  • CVE-2015-2373 Remote Desktop Protocol (RDP) Remote Code Execution Vulnerability
    There are no known exploits in the wild.
MS15-068 Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution 
  • CVE-2015-2361 Hyper-V Buffer Overflow Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2362 Hyper-V System Data Structure Vulnerability
    There are no known exploits in the wild.
MS15-069 Vulnerabilities in Windows Could Allow Remote Code Execution 
  • CVE-2015-2368 Windows DLL Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2369 DLL Planting Remote Code Execution Vulnerability
    There are no known exploits in the wild.
MS15-070 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution 
  • CVE-2015-2376 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2377 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2379 Microsoft Office Memory Corruption Vulnerability
    SPY:3107 "Malformed-File doc.MP.24"
  • CVE-2015-2380 Microsoft Office Memory Corruption Vulnerability
    SPY:3106 "Malformed-File doc.MP.23"
  • CVE-2015-2415 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2424 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
MS15-071 Vulnerability in Netlogon Could Allow Elevation of Privilege 
  • CVE-2015-2374 Elevation of Privilege Vulnerability in Netlogon
    There are no known exploits in the wild.
MS15-072 Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege 
  • CVE-2015-2364 Graphics Component EOP Vulnerability
    SPY:3105 "Malformed-File swf.MP.234"
MS15-073 Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege 
  • CVE-2015-2363 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2365 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2366 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2367 Win32k Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2381 Win32k Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2382 Win32k Information Disclosure Vulnerability
    There are no known exploits in the wild.
MS15-074 Vulnerability in Windows Installer Service Could Allow Elevation of Privilege 
  • CVE-2015-2371 Windows Installer EoP Vulnerability
    There are no known exploits in the wild.
MS15-075 Vulnerabilities in OLE Could Allow Elevation of Privilege 
  • CVE-2015-2416 OLE Elevation of Privilege Vulnerability
    SPY:3105 "Malformed-File swf.MP.234"
  • CVE-2015-2417 OLE Elevation of Privilege Vulnerability
    SPY:3105 "Malformed-File swf.MP.234"
MS15-076 Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege 
  • CVE-2015-2370 Windows RPC Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
MS15-076 Vulnerability in ATM Font Driver Could Allow Elevation of Privilege 
  • CVE-2015-2387 ATMFD.DLL Memory Corruption Vulnerability
    There are no known exploits in the wild.
Source : SonicWall Security Center

Have a good time.
(Be knowledgeable, pass it on then)

Comments

Popular posts from this blog

Fortigate guide for Begineer - 6

I would like to explaine how to troubleshoot the Fortigate Unit configured by Transparent Mode in step by step this time. Let's assume, you have one Fortigate Unit that configured as Transparent Mode. But devices from Internal/Private Network unable to access Internet/Public Network through your Fortigate Unit. OK. Let's troubleshoot with following steps, 1) Check the physical network connections between the network and the FortiGate unit, and between the FortiGate unit and the Internet. 2) Check the router and ISP-supplied equipment to make sure it is operating correctly. 3) Verify that you can connect to the internal interface by connecting to the management IP address of the FortiGate unit from the Internal network. From the internal network, attempt to ping the management IP address. If you cannot connect to the internal interface, verify the IP configuration of the PC and make sure the cables are connected and all switches and other devices on the network are powered on a

Solving the "A general system error occured:Invalid fault" error in vSphere 4

Below error was come out when you try to migrate VM to other host for some reason. Below error was come out when you try to edit VM setting. Below error was come out when you power on the VM. How to solve those error? Here is how I resolve the error! Login to the Host that errored VM exist by using Terminal or Direct Console. Enter below command and press enter. services.sh restart Wait until all VMware Services are restarted. After that try to Power On/Edit Settings or Migrate the errored VM and you will see all you can do without any error pop-up. This kind of errors can occur if you shutdown/restart VM unproperly or shutdown/restart the Host unproperly that VM exist. You can check log file deeply if you willing to know precisely on this. May you all be happy. (Be knowledgeable, pass it on then)

Why do we need network virtualization?

We need to think about Server Virtualization first if we want to talk about Network Virtualization. In the era of cloud computing, servers are virtualized and used in Data Centers. We are facing a lot of problem when we virtualized our Servers, 1) Routing and Switching Problem Routing become the issue when we create Virtual Switch and VLANs according to production requirement. Network Team might need some time to change on their end to meet with Server Virtualization Team changes on their end. ၂) Firewall Services Physical Firewall are difficult to manage due to the large number of rules needed to satisfy business requirements. New applications, new projects, and new networks all come with potential security requirements, which impact centralized firewall management. ၃) Load Balancing Let's say your company deploys a new physical load balancer for each tenant, resulting in increased capital expenditures. Once a tenant reaches their maximum capacity, it ca