Microsoft DLL Processing and Windows Text Services Bugs Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1031890 |
SecurityTracker URL: http://securitytracker.com/id/1031890
|
CVE Reference:
CVE-2015-0081, CVE-2015-0096
(Links to External Site)
|
Updated: Mar 13 2015
|
Original Entry Date: Mar 10 2015
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8, 8.1, 2012, 2012 R2, RT, RT 8.1; and prior service packs
|
Description:
Two vulnerabilities were reported in Microsoft Windows. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create a specially crafted file that, when loaded by the target user, will trigger an object memory handling flaw in Windows Text Services and execute arbitrary code on the target system [CVE-2015-0081]. The code will run with the privileges of the target user.
A remote user can create a specially crafted DLL. When the target user opens a file from the same working directory as the DLL file, the DLL will be loaded and execute arbitrary code [CVE-2015-0096].
[Editor's note: HP reported that MS15-020 issued on March 10, 2015 corrects the vulnerability (CVE-2015-9906) originally identified as CVE-2010-2568 (Alert ID 1024216) in July 2010 and as exploited in the Stuxnet worm.]
|
Impact:
A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
The vendor has issued a fix.
A patch matrix is available in the vendor's advisory.
The Microsoft advisory is available at:
https://technet.microsoft.com/library/security/ms15-020
|
Vendor URL: technet.microsoft.com/library/security/ms15-020 (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|