CERT-In Vulnerability Note
CIVN-2015-0255
Microsoft Windows Shell Remote Code Execution Vulnerabilities
Original Issue Date:October 14, 2015
Severity Rating: HIGH
Software Affected
- Windows Vista and Vista x64 Edition SP2
- Windows Server 2008 for 32-bit Systems and x64-based Systems SP2
- Windows Server 2008 for Itanium-based Systems SP2
- Windows 7 for 32-bit and x64-based Systems SP1
- Windows Server 2008 R2 for Itanium-based Systems and x64-based Systems SP1
- Windows 8 and 8.1 for 32-bit and x64-based Systems
- Windows Server 2012 and Windows Server 2012 R2
- Windows RT and Windows RT 8.1
- Windows 10 for 32-bit and x64-based Systems
Overview
Two vulnerabilities have been reported in Microsoft Windows Shell, which could be exploited by remote attackers to execute an arbitrary code and completely compromise the affected system.
Description
1. Microsoft Windows Toolbar Handling Use-After-Free Vulnerability
(
CVE-2015-2515
)
This vulnerability exist in the toolbar component of Microsoft Windows due to improper memory operations performed by the affected software when handling crafted content. A remote attacker could exploit this vulnerability by convincing a user to open a malicious toolbar object. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code with the privileges of the user and take control of the affected system.
2. Microsoft Windows Tablet Input Band Use-After-Free Vulnerability
(
CVE-2015-2548
)
This vulnerability exist in the Microsoft Tablet Input Band component of Microsoft Windows due to improper memory operations performed when handling crafted content. A remote attacker could exploit this vulnerability by convincing a user to open a malicious toolbar object. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code with the privileges of the user and take control of the affected system.
Workaround
- Deny access to TipBand.dll
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS15-109
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/MS15-109
References
Microsoft
https://technet.microsoft.com/en-us/library/security/MS15-109
Symantec
https://www.symantec.com/security_response/vulnerability.jsp?bid=76989
https://www.symantec.com/security_response/vulnerability.jsp?bid=76981
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=41361
http://tools.cisco.com/security/center/viewAlert.x?alertId=41362
CVE Name
CVE-2015-2515
CVE-2015-2548
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|