Skip to main content

Microsoft Security Bulletin Coverage (July 14, 2015)

As usual, Microsoft has released security advisories for Month of July, 2015.
So, you have to check that your Security Devices are able to protect below CVE ID or not.
If you are using Dell SonicWall Security Products and they are set to download patches automatically, then no need to worry because of SonicWall Security Team already released the patches to cover these vulnerabilities.
If your devices are not auto-update, then patch them manually.
Check below CVE ID for your reference and awareness,

MS15-058 Vulnerabilities in SQL Server Could Allow Remote Code Execution
  • CVE-2015-1761 SQL Server Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-1762 SQL Server Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-1763 SQL Server Remote Code Execution Vulnerability
    There are no known exploits in the wild.
MS15-065 Security Update for Internet Explorer 
  • CVE-2015-1729 Internet Explorer Information Disclosure Vulnerability
    IPS: 5962 "Internet Explorer Cross-domain Information Disclosure (MS14-065) 2"
  • CVE-2015-1733 Internet Explorer Memory Corruption Vulnerability
    IPS: 11026 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 10"
  • CVE-2015-1738 Internet Explorer Memory Corruption Vulnerability
    IPS: 11027 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 11"
  • CVE-2015-1767 Internet Explorer Memory Corruption Vulnerability
    IPS: 11028 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 12"
  • CVE-2015-2372 VBScript Memory Corruption Vulnerability
    IPS: 11029 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 13"
  • CVE-2015-2383 Internet Explorer Memory Corruption Vulnerability
    IPS: 11030 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 14"
  • CVE-2015-2384 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2385 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2388 Internet Explorer Memory Corruption Vulnerability
    IPS: 11031 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 15"
  • CVE-2015-2389 Internet Explorer Memory Corruption Vulnerability
    IPS: 11032 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 16"
  • CVE-2015-2390 Internet Explorer Memory Corruption Vulnerability
    IPS: 11033 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 17"
  • CVE-2015-2391 Internet Explorer Memory Corruption Vulnerability
    IPS: 11034 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 18"
  • CVE-2015-2397 Internet Explorer Memory Corruption Vulnerability
    IPS: 7638 "DOM Object Use-After-Free Attack 2"
  • CVE-2015-2398 Internet Explorer XSS Filter Bypass Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2401 Internet Explorer Memory Corruption Vulnerability
    IPS: 11036 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 20"
  • CVE-2015-2402 Internet Explorer Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2403 Internet Explorer Memory Corruption Vulnerability
    IPS: 2175 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 1"
  • CVE-2015-2404 Internet Explorer Memory Corruption Vulnerability
    IPS: 2190 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 2"
  • CVE-2015-2406 Internet Explorer Memory Corruption Vulnerability
    IPS: 2191 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 3"
  • CVE-2015-2408 Internet Explorer Memory Corruption Vulnerability
    IPS: 2192 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 4"
  • CVE-2015-2410 Internet Explorer Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2411 Internet Explorer Memory Corruption Vulnerability
    IPS: 2198 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 5"
  • CVE-2015-2412 Internet Explorer Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2413 Internet Explorer Information Disclosure Vulnerability
    IPS: 2207 "Internet Explorer Information Disclosure Vulnerability (MS15-065) 1"
  • CVE-2015-2414 Internet Explorer Information Disclosure Vulnerability
    IPS: 2208 "Internet Explorer Information Disclosure Vulnerability (MS15-065) 2"
  • CVE-2015-2419 Jscript9 Memory Corruption Vulnerability
    IPS: 2209 "Internet Explorer JScript9 Memory Corruption Vulnerability (MS15-065)"
  • CVE-2015-2421 Internet Explorer ASLR Bypass
    IPS: 2210 "Internet Explorer ASLR Bypass Vulnerability (MS15-065)"
  • CVE-2015-2422 Internet Explorer Memory Corruption Vulnerability
    IPS: 2233 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 6"
  • CVE-2015-2425 Internet Explorer Memory Corruption Vulnerability
    IPS: 2234 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 7"
  • CVE-2015-2372 VBScript Memory Corruption Vulnerability
    IPS: 11029 "Internet Explorer Memory Corruption Vulnerability (MS15-065) 13"
  • CVE-2015-2398 Internet Explorer XSS Filter Bypass Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2402 Internet Explorer Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2419 Jscript9 Memory Corruption Vulnerability
    IPS: 2209 "Internet Explorer JScript9 Memory Corruption Vulnerability (MS15-065)"
  • CVE-2015-2421 Internet Explorer ASLR Bypass
    IPS: 2210 "Internet Explorer ASLR Bypass Vulnerability (MS15-065)"
MS15-066 Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution
  • CVE-2015-2372 VBScript Memory Corruption Vulnerability
    There are no known exploits in the wild.
MS15-067 Vulnerability in RDP Could Allow Remote Code Execution 
  • CVE-2015-2373 Remote Desktop Protocol (RDP) Remote Code Execution Vulnerability
    There are no known exploits in the wild.
MS15-068 Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution 
  • CVE-2015-2361 Hyper-V Buffer Overflow Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2362 Hyper-V System Data Structure Vulnerability
    There are no known exploits in the wild.
MS15-069 Vulnerabilities in Windows Could Allow Remote Code Execution 
  • CVE-2015-2368 Windows DLL Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2369 DLL Planting Remote Code Execution Vulnerability
    There are no known exploits in the wild.
MS15-070 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution 
  • CVE-2015-2376 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2377 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2379 Microsoft Office Memory Corruption Vulnerability
    SPY:3107 "Malformed-File doc.MP.24"
  • CVE-2015-2380 Microsoft Office Memory Corruption Vulnerability
    SPY:3106 "Malformed-File doc.MP.23"
  • CVE-2015-2415 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2424 Microsoft Office Memory Corruption Vulnerability
    There are no known exploits in the wild.
MS15-071 Vulnerability in Netlogon Could Allow Elevation of Privilege 
  • CVE-2015-2374 Elevation of Privilege Vulnerability in Netlogon
    There are no known exploits in the wild.
MS15-072 Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege 
  • CVE-2015-2364 Graphics Component EOP Vulnerability
    SPY:3105 "Malformed-File swf.MP.234"
MS15-073 Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege 
  • CVE-2015-2363 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2365 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2366 Win32k Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2367 Win32k Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2381 Win32k Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2015-2382 Win32k Information Disclosure Vulnerability
    There are no known exploits in the wild.
MS15-074 Vulnerability in Windows Installer Service Could Allow Elevation of Privilege 
  • CVE-2015-2371 Windows Installer EoP Vulnerability
    There are no known exploits in the wild.
MS15-075 Vulnerabilities in OLE Could Allow Elevation of Privilege 
  • CVE-2015-2416 OLE Elevation of Privilege Vulnerability
    SPY:3105 "Malformed-File swf.MP.234"
  • CVE-2015-2417 OLE Elevation of Privilege Vulnerability
    SPY:3105 "Malformed-File swf.MP.234"
MS15-076 Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege 
  • CVE-2015-2370 Windows RPC Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
MS15-076 Vulnerability in ATM Font Driver Could Allow Elevation of Privilege 
  • CVE-2015-2387 ATMFD.DLL Memory Corruption Vulnerability
    There are no known exploits in the wild.
Source : SonicWall Security Center

Have a good time.
(Be knowledgeable, pass it on then)

Comments

Popular posts from this blog

Fortigate guide for Begineer - 6

I would like to explaine how to troubleshoot the Fortigate Unit configured by Transparent Mode in step by step this time. Let's assume, you have one Fortigate Unit that configured as Transparent Mode. But devices from Internal/Private Network unable to access Internet/Public Network through your Fortigate Unit. OK. Let's troubleshoot with following steps, 1) Check the physical network connections between the network and the FortiGate unit, and between the FortiGate unit and the Internet. 2) Check the router and ISP-supplied equipment to make sure it is operating correctly. 3) Verify that you can connect to the internal interface by connecting to the management IP address of the FortiGate unit from the Internal network. From the internal network, attempt to ping the management IP address. If you cannot connect to the internal interface, verify the IP configuration of the PC and make sure the cables are connected and all switches and other devices on the network are powered on a...

Why do we need network virtualization?

We need to think about Server Virtualization first if we want to talk about Network Virtualization. In the era of cloud computing, servers are virtualized and used in Data Centers. We are facing a lot of problem when we virtualized our Servers, 1) Routing and Switching Problem Routing become the issue when we create Virtual Switch and VLANs according to production requirement. Network Team might need some time to change on their end to meet with Server Virtualization Team changes on their end. ၂) Firewall Services Physical Firewall are difficult to manage due to the large number of rules needed to satisfy business requirements. New applications, new projects, and new networks all come with potential security requirements, which impact centralized firewall management. ၃) Load Balancing Let's say your company deploys a new physical load balancer for each tenant, resulting in increased capital expenditures. Once a tenant reaches their maximum capacity, it ca...

Link Aggregating with Synology NAS and Cisco Switch

I’d like to share how to setup Link Aggregating between Synology NAS and Cisco Switch. I’ve got one Synology NAS with 4 Network Ports and I’m going to use 2 of them. Both Network Port to be as one Logical Link, Fault Tolerance and Load Balancing. To do that, I need to configure Link Aggregating on Synology NAS and EtherChannel with LACP on Cisco Switch. Below is brief steps to do to meet with my requirements. - Get connected Synology NAS and Cisco Switch as shown in picture. - Bonding two Network Ports of Synology NAS and assign IP Address - Configure EtherChannel with LACP in Cisco Switch and add two physical ports as Member. OK. Let’s begin from Synology NAS. - Login to the Synology and go to Control Panel>Network>Create>Create Bond - Select IEEE 802.3ad to get Fault Tolerance and Load Balancing Featureyou’re your switch not support 802.3ad you can only select Fault Tolerance only feature). After that click “Next”. - Choose the network port f...