SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Microsoft GDI+ Vendors:   Microsoft
Microsoft Graphics Component Bugs Let Remote Users Execute Arbitrary Code and Remote Authenticated Users Bypass Security Features and Gain Elevated Privileges
SecurityTracker Alert ID:  1033238
SecurityTracker URL:  http://securitytracker.com/id/1033238
CVE Reference:   CVE-2015-2431, CVE-2015-2432, CVE-2015-2433, CVE-2015-2435, CVE-2015-2453, CVE-2015-2454, CVE-2015-2455, CVE-2015-2456, CVE-2015-2458, CVE-2015-2459, CVE-2015-2460, CVE-2015-2461, CVE-2015-2462, CVE-2015-2463, CVE-2015-2464, CVE-2015-2465   (Links to External Site)
Updated:  Aug 24 2015
Original Entry Date:  Aug 11 2015
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8, 8.1, 2012, 2012 R2, RT, RT 8.1, 10; and prior service packs
Description:   Multiple vulnerabilities were reported in Microsoft Graphics Component. A remote user can cause arbitrary code to be executed on the target user's system. A remote authenticated user can gain elevated privileges. A remote user can bypass security features on the target system.

A remote user can create a specially crafted OpenType font file that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2015-2432, CVE-2015-2458, CVE-2015-2459, CVE-2015-2460, CVE-2015-2461, CVE-2015-2462].

A remote user can create a specially crafted TrueType font file that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2015-2435, CVE-2015-2455, CVE-2015-2456, CVE-2015-2463, CVE-2015-2464].

A remote user can bypass Address Space Layout Randomization (ASLR) security features on the target system [CVE-2015-2433].

A remote authenticated user can bypass security controls to gain elevated privileges on the target system [CVE-2015-2453, CVE-2015-2454, CVE-2015-2465].

A remote user can create a specially crafted Office Graphics Library (OGL) font that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2015-2431].


Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote authenticated user can gain elevated privileges on the target system.

A remote user can bypass security controls on the target system.

Solution:   The vendor has issued a fix.

Windows Vista Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=c7328662-404a-4cc5-9d3f-719203905045

Windows Vista x64 Edition Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=e4cb2e6a-cc6d-42e3-8b48-e60f69d1ee54

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=e1d81b33-62c3-42aa-801b-ad7f63f9cf5c

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=eb898fe4-5637-41bd-a22e-bddabd9f8c4a

Windows Server 2008 for Itanium-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=1fdb580b-4ffd-455f-9f62-26722cc6912f

Windows 7 for 32-bit Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=740db25d-f7fd-4b12-83aa-29b6ff6f8b37

Windows 7 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=24aa4f1e-b7aa-44fd-8c60-c7fab849fd46

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=df447b6f-6665-4c70-9b1d-a9a6bc8e63f6

Windows Server 2008 R2 for Itanium-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=7e074e55-e815-4a7e-bdbf-919aebc0c873

Windows 8 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=ed6502ca-131b-49ef-a6a2-460536365211

Windows 8 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=dc921461-650f-403e-9def-be035d10508b

Windows 8.1 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=fbae517a-b3fc-4dde-a8dc-794f76d8ec31

Windows 8.1 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=d1fb93c3-5d47-4e2e-9bc3-b4526c3f1501

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=a8a7b5bb-3bb7-409e-88f9-1179a04f8460

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=6a406a0e-83e1-4491-a384-52d8c789d944

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=e1d81b33-62c3-42aa-801b-ad7f63f9cf5c

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=eb898fe4-5637-41bd-a22e-bddabd9f8c4a

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=df447b6f-6665-4c70-9b1d-a9a6bc8e63f6

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=a8a7b5bb-3bb7-409e-88f9-1179a04f8460

On August 21, 2015, the vendor announced that a revised update 3078601 for Windows Vista SP2, Windows Server 2008 SP2, Windows Server 2008 R2 SP2, and Windows 7 Service Pack 1 was issued on August 18, 2015. Users that installed the update via the Microsoft Download Center prior to August 18, 2105 should reapply this update.

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms15-080

Vendor URL:  technet.microsoft.com/library/security/ms15-080 (Links to External Site)
Cause:   Access control error, Randomization error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC