Microsoft Internet Explorer Multiple Bugs Let Remote Users Bypass ASLR and Execute Arbitrary Code
|
SecurityTracker Alert ID: 1032108 |
SecurityTracker URL: http://securitytracker.com/id/1032108
|
CVE Reference:
CVE-2015-1652, CVE-2015-1657, CVE-2015-1659, CVE-2015-1660, CVE-2015-1661, CVE-2015-1662, CVE-2015-1665, CVE-2015-1666, CVE-2015-1667, CVE-2015-1668
(Links to External Site)
|
Updated: May 1 2015
|
Original Entry Date: Apr 14 2015
|
Impact:
Disclosure of system information, Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 6, 7, 8, 9, 10, 11
|
Description:
Multiple vulnerabilities were reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system.
A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2015-1652, CVE-2015-1657, CVE-2015-1659, CVE-2015-1660, CVE-2015-1662, CVE-2015-1665, CVE-2015-1666, CVE-2015-1667, CVE-2015-1668].
A remote user can obtain potentially sensitive information and bypass address space layout randomization (ASLR) security protections [CVE-2015-1661].
0016EECD9D7159A949DAD3BC17E0A939 (via HP's Zero Day Initiative), Jihui Lu of KeenTeam (@K33nTeam), Jason Kratzer (via HP's Zero Day Initiative), Arthur Gerkis (via HP's Zero Day Initiative), AbdulAziz Hariri (via HP's Zero Day Initiative), AMol NAik & Garage4Hackers (via HP's Zero Day Initiative), b0nd@garage4hackers@ (via HP's Zero Day Initiative), ca0nguyen (via HP's Zero Day Initiative), Omair (via HP's Zero Day Initiative) reported these vulnerabilities.
|
Impact:
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A remote user can bypass ASLR security protections.
|
Solution:
The vendor has issued a fix.
A patch matrix is available in the vendor's advisory.
[Editor's note: On April 30, 2015, the vendor updated their advisory to indicate that users of IE on Windows Server 2003 SP2 who installed update 3038314 prior to April 22, 2015 should re-install update 3038314.]
The Microsoft advisory is available at:
https://technet.microsoft.com/library/security/ms15-032
|
Vendor URL: technet.microsoft.com/library/security/ms15-032 (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|