CERT-In Vulnerability Note
CIVN-2015-0274
Multiple vulnerabilities in Microsoft Internet Explorer
Original Issue Date:November 12, 2015
Severity Rating: HIGH
Software Affected
- Windows Vista SP2
- Windows Vista x64 Edition SP2
- Windows Server 2008 for 32-bit Systems SP2, x64-based Systems SP2 and Itanium-based Systems SP2
- Windows Server 2008 for Windows 7 for 32-bit Systems SP1
- Windows 7 for x64-based Systems SP1
- Windows Server 2008 R2 for x64-based Systems SP1 and Itanium-based Systems SP1
- Windows 8 for 32-bit Systems and x64-based Systems
- Windows 8 for Windows Server 2012
- Windows RT
- Windows 8.1 for 32-bit Systems and x64-based Systems
- Windows Server 2012 R2
- Windows RT 8.1
- Windows 10 for 32-bit Systems and x64-based Systems
- Windows 10 Version 1511 for 32-bit Systems and for x64-based Systems
- Internet Explorer 7,8,9,10 and 11
Overview
Multiple vulnerabilities have been reported in Microsoft Internet Explorer which could allow a remote attacker to gain elevated privileges, disclose sensitive information, bypass security restriction or execute arbitrary code in context of the current logged in user.
Description
1. Internet Explorer Memory Corruption Vulnerabilities
(
CVE-2015-2427
CVE-2015-6064
CVE-2015-6065
CVE-2015-6066
CVE-2015-6068
CVE-2015-6069
CVE-2015-6070
CVE-2015-6071
CVE-2015-6072
CVE-2015-6073
CVE-2015-6074
CVE-2015-6075
CVE-2015-6076
CVE-2015-6077
CVE-2015-6078
CVE-2015-6079
CVE-2015-6080
CVE-2015-6081
CVE-2015-6082
CVE-2015-6084
CVE-2015-6085
CVE-2015-6087
)
Multiple vulnerabilities exist in Internet Explorer due to improper accessing of objects in memory. A remote attacker could exploit these vulnerabilities by enticing the targeted user to visit a malicious website which could result in memory corruption. Successful exploitation of these vulnerabilities could lead to execution of arbitrary code in the context of the logged in user. If the user holds elevated privileges, the attacker could achieve a complete compromise of the targeted system.
2. Scripting Engine Memory Corruption Vulnerability
(
CVE-2015-6089
)
A vulnerability exists in Microsoft Internet Explorer due to improper accessing of objects in the memory while rendering the JScript and VBScript engines. A remote attacker could exploit this vulnerability by convincing the targeted user to visit a specially crafted website through Internet Explorer or embedding a "safe for initialization" ActiveX control in an application or Microsoft Office document that hosts the IE rendering engine resulting in memory corruption of the targeted system. Successful exploitation of this vulnerability could allow the attacker to gain elevated privileges of the target user. The attacker could also gain complete control of the target system if the user is logged in with admin privileges.
3. Information Disclosure Vulnerability
(
CVE-2015-6086
)
A vulnerability exists in Internet Explorer due to improper handling of objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to view a specially crafted website. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information from its memory.
4. ASLR Bypass Vulnerability
(
CVE-2015-1685
)
A vulnerability exists in Microsoft Internet Explorer due to improper implementation of the Address Space Layout Randomization (ASLR) security feature. A remote attacker could exploit this vulnerability by predicting memory offset of specific instruction in a given call stack to bypass ASLR feature. This vulnerability in conjunction with other vulnerabilities could lead to further attacks.
Workaround
- Restrict access to VBScript.dll and JScript.dll
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS15-112
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/ms15-112
References
Security Tracker
http://www.securitytracker.com/id/1034112
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=41846
http://tools.cisco.com/security/center/viewAlert.x?alertId=41823
http://tools.cisco.com/security/center/viewAlert.x?alertId=41845
http://tools.cisco.com/security/center/viewAlert.x?alertId=41843
http://tools.cisco.com/security/center/viewAlert.x?alertId=41844
http://tools.cisco.com/security/center/viewAlert.x?alertId=41846
http://tools.cisco.com/security/center/viewAlert.x?alertId=41839
http://tools.cisco.com/security/center/viewAlert.x?alertId=41838
http://tools.cisco.com/security/center/viewAlert.x?alertId=41837
http://tools.cisco.com/security/center/viewAlert.x?alertId=41842
http://tools.cisco.com/security/center/viewAlert.x?alertId=41841
http://tools.cisco.com/security/center/viewAlert.x?alertId=41835
http://tools.cisco.com/security/center/viewAlert.x?alertId=41833
http://tools.cisco.com/security/center/viewAlert.x?alertId=41832
http://tools.cisco.com/security/center/viewAlert.x?alertId=41840
http://tools.cisco.com/security/center/viewAlert.x?alertId=41825
http://tools.cisco.com/security/center/viewAlert.x?alertId=41824
http://tools.cisco.com/security/center/viewAlert.x?alertId=41822
CVE Name
CVE-2015-2427
CVE-2015-6064
CVE-2015-6065
CVE-2015-6066
CVE-2015-6068
CVE-2015-6069
CVE-2015-6070
CVE-2015-6071
CVE-2015-6072
CVE-2015-6073
CVE-2015-6074
CVE-2015-6075
CVE-2015-6076
CVE-2015-6077
CVE-2015-6078
CVE-2015-6079
CVE-2015-6080
CVE-2015-6081
CVE-2015-6082
CVE-2015-6084
CVE-2015-6085
CVE-2015-6087
CVE-2015-6089
CVE-2015-6086
CVE-2015-6088
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|