SB2015071401 - Multiple vulnerabilities in Microsoft Internet Explorer
Published: July 14, 2015 Updated: January 31, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 29 secuirty vulnerabilities.
1) Security bypass (CVE-ID: CVE-2015-2421)
The vulnerabiity allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to failure to use Address Space Layout Randomization. A remote attacker can create a specially crafted Web site, trick the victim into visiting, bypass ASLR mechanism and obtain potentially sensitive information.
Successful exploitation of this vulnerability results in security bypass on the vulnerable system.
2) Information disclosure (CVE-ID: CVE-2015-2410)
The vulnerabiity allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of requests from external stylesheets. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and determine specific files on the system.
Successful exploitation of this vulnerability results in information disclosure on the vulnerable system.
3) Information disclosure (CVE-ID: CVE-2015-2412)
The vulnerabiity allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper validation of file paths. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and view content from arbitrary files on the system.
Successful exploitation of this vulnerability results in information disclosure on the vulnerable system.
4) Information disclosure (CVE-ID: CVE-2015-2413)
The vulnerabiity allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of module resource requests. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and determine specific files on the system..
Successful exploitation of this vulnerability results in information disclosure on the vulnerable system.
5) Information disclosure (CVE-ID: CVE-2015-2414)
The vulnerabiity allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of cached image information. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and determine the victim's browsing history.
Successful exploitation of this vulnerability results in information disclosure on the vulnerable system.
6) Memory corruption (CVE-ID: CVE-2015-2422)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
7) Memory corruption (CVE-ID: CVE-2015-2419)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JScript engine. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
8) Memory corruption (CVE-ID: CVE-2015-2411)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
9) Memory corruption (CVE-ID: CVE-2015-2408)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
10) Memory corruption (CVE-ID: CVE-2015-2406)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
11) Memory corruption (CVE-ID: CVE-2015-2404)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
12) Privilege escalation (CVE-ID: CVE-2015-2402)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to improper validation of permissions. A remote attacker can create a specially crafted file, trick the victim into opening it and run script with privileges of the current user.
Successful exploitation of the vulnerability results in privilege escalation on the vulnerable system.
13) Memory corruption (CVE-ID: CVE-2015-2403)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
14) Memory corruption (CVE-ID: CVE-2015-2401)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
15) Cross-Site Scripting (CVE-ID: CVE-2015-2398)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.The vulnerability exists due to insufficient sanitization of user-input. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
16) Memory corruption (CVE-ID: CVE-2015-2397)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
17) Memory corruption (CVE-ID: CVE-2015-2391)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
18) Memory corruption (CVE-ID: CVE-2015-2390)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
19) Memory corruption (CVE-ID: CVE-2015-2389)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
20) Memory corruption (CVE-ID: CVE-2015-2388)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
21) Memory corruption (CVE-ID: CVE-2015-2385)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
22) Memory corruption (CVE-ID: CVE-2015-2384)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
23) Memory corruption (CVE-ID: CVE-2015-2383)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
24) Memory corruption (CVE-ID: CVE-2015-1767)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
25) Memory corruption (CVE-ID: CVE-2015-2372)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
26) Memory corruption (CVE-ID: CVE-2015-1738)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
27) Memory corruption (CVE-ID: CVE-2015-1733)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
28) Information disclosure (CVE-ID: CVE-2015-1729)
The vulnerabiity allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to the failure to properly enforce cross-domain policies. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and view content from another domain or Internet Explorer zone.
Successful exploitation of this vulnerability results in information disclosure on the vulnerable system.
29) Memory corruption (CVE-ID: CVE-2015-2425)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
Remediation
Install update from vendor's website.