Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 45 vulnerabilities that were fixed in 8 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 8 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update is rated Important for all supported editions of Microsoft Office 2007,Microsoft Office 2010,Microsoft Office 2013,Microsoft Office 2013 RT.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-059 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-059 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS15-059 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS15-059 Microsoft Office Compatibility Pack Service Pack 3
This security update resolves vulnerabilities in Internet Explorer.
- An information disclosure vulnerability exists in Internet Explorer that could allow an attacker who successfully exploits this vulnerability to gain access to a users browser history.
- Elevation of privilege vulnerabilities exist when Internet Explorer does not properly validate permissions under specific conditions, potentially allowing scripts to be run with elevated privileges.
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-056 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-056 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-056 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-056 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-056 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS15-056 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS15-056 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS15-056 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS15-056 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-056 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-056 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-056 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-056 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-056 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-056 Windows Server 2012(Internet Explorer 10)
MS15-056 Windows Server 2012 R2(Internet Explorer 11)
MS15-056 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-056 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-056 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-056 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-056 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-056 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
A remote code execution vulnerability exists in the way that Windows Media Player handles specially crafted DataObjects. The security update addresses the vulnerability by correcting how Windows Media Player handles DataObjects.
This security update is rated Critical for Windows Media Player 10 when installed on Windows Server 2003, Windows Media Player 11 when installed on Windows Vista or Windows Server 2008, and Windows Media Player 12 when installed on Windows 7 or Windows Server 2008 R2.
Workaround:
- Remove wmplayer.exe from the Internet Explorer ElevationPolicy
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-057 Windows 7 for 32-bit Systems Service Pack 1(Windows Media Player 12)
MS15-057 Windows 7 for x64-based Systems Service Pack 1(Windows Media Player 12)
MS15-057 Windows Server 2003 Service Pack 2(Windows Media Player 10)
MS15-057 Windows Server 2003 x64 Edition Service Pack 2(Windows Media Player 10)
MS15-057 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Windows Media Player 12)
MS15-057 Windows Server 2008 for 32-bit Systems Service Pack 2(Windows Media Player 11)
MS15-057 Windows Server 2008 for x64-based Systems Service Pack 2(Windows Media Player 11)
MS15-057 Windows Vista Service Pack 2(Windows Media Player 11)
MS15-057 Windows Vista x64 Edition Service Pack 2(Windows Media Player 11)
The security update addresses the vulnerability by correcting how Windows handles objects in memory.
Affected Versions:
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1.
Workaround:
Disable Internet Explorer Developer Tools via the System Registry
To disable Internet Explorer Developer tools, create and run the following managed script:
1. Save the following to a file with a .reg extension (e.g., Disable_IEDevTools.reg):
Windows Registry Editor Version 5.00
HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\IEDevTools]
"Disabled"=dword:00000001
2. Run the above registry script on the target machine with the following command:
Regedit.exe /s Disable_IEDevTools.reg
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-060 Windows 7 for 32-bit Systems Service Pack 1
MS15-060 Windows 7 for x64-based Systems Service Pack 1
MS15-060 Windows 8 for 32-bit Systems
MS15-060 Windows 8 for x64-based Systems
MS15-060 Windows 8.1 for 32-bit Systems
MS15-060 Windows 8.1 for x64-based Systems
MS15-060 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-060 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-060 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-060 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-060 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-060 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-060 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-060 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-060 Windows Server 2012
MS15-060 Windows Server 2012
MS15-060 Windows Server 2012 R2
MS15-060 Windows Server 2012 R2
MS15-060 Windows Vista Service Pack 2
MS15-060 Windows Vista x64 Edition Service Pack 2
This security update is rated Important for all supported releases of Windows.
Note: Windows XP is end of life and is vulnerable to this issue. For further details see Exploits Against Obsolete Software.
Workaround:
Disable NULL page mapping on Windows 7
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-061 Windows 7 for 32-bit Systems Service Pack 1
MS15-061 Windows 7 for x64-based Systems Service Pack 1
MS15-061 Windows 8 for 32-bit Systems
MS15-061 Windows 8 for x64-based Systems
MS15-061 Windows 8.1 for 32-bit Systems
MS15-061 Windows 8.1 for x64-based Systems
MS15-061 Windows Server 2003 R2 Service Pack 2
MS15-061 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-061 Windows Server 2003 Service Pack 2
MS15-061 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-061 Windows Server 2003 x64 Edition Service Pack 2
MS15-061 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-061 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-061 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-061 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-061 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-061 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-061 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-061 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-061 Windows Server 2012
MS15-061 Windows Server 2012
MS15-061 Windows Server 2012 R2
MS15-061 Windows Server 2012 R2
MS15-061 Windows Vista Service Pack 2
MS15-061 Windows Vista x64 Edition Service Pack 2
This security update is rated Important for Active Directory Federation Services 2.0 and Active Directory Federation Services 2.1.
Affected Software:
AD FS 2.0 when installed on 32-bit and x64-based editions of Windows Server 2008
AD FS 2.0 when installed on x64-based editions of Windows Server 2008 R2
AD FS 2.1 when installed on x64-based editions of Windows Server 2012
Workaround:
Use a web application firewall to block suspicious requests.
Use a web application firewall (WAF) to block requests to /adfs/ls where the query parameter "wct" contains HTML markup or javascript code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-062 Windows Server 2008(Active Directory Federation Services 2.0)
MS15-062 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Active Directory Federation Services 2.0)
MS15-062 Windows Server 2008 for x64-based Systems Service Pack 2(Active Directory Federation Services 2.0)
An elevation of privilege vulnerability exists in Microsoft Windows LoadLibrary when it fails to properly validate user input. The update addresses the vulnerability by correcting how Windows validates user input.
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-063 Windows 8
MS15-063 Windows 8 for x64-based Systems
MS15-063 Windows 8.1
MS15-063 Windows 8.1 for x64-based Systems
MS15-063 Windows Server 2003
MS15-063 Windows Server 2003 for Itanium-based Systems
MS15-063 Windows Server 2003 x64 Edition
MS15-063 Windows Server 2012
MS15-063 Windows Server 2012 R2
MS15-063 Windows Vista
MS15-063 Windows Vista for x64-based Systems
MS15-063 Windows XP
MS15-063 Windows XP x64 Edition
- An information disclosure vulnerability exists in Microsoft Exchange web applications when Exchange does not properly manage same-origin policy.
- An elevation of privilege vulnerability exists in Microsoft Exchange web applications when Exchange does not properly manage user sessions.
- An information disclosure vulnerability exists in Microsoft Exchange web applications when Exchange does not properly sanitize HTML strings.
Microsoft has released a security update that addresses the vulnerabilities by modifying how Exchange web applications manage same-origin policy, by modifying how Exchange web applications manage user session authentication and by correcting how Exchange web applications sanitize HTML strings.
The security update is rated Important for all supported editions of Microsoft Exchange Server 2013.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-064 Microsoft Exchange Server 2013 Cumulative Update 8
MS15-064 Microsoft Exchange Server 2013 Service Pack 1
These new vulnerability checks are included in Qualys vulnerability signature 2.3.36-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.