Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 26 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-032 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-032 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-032 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-032 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-032 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS15-032 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS15-032 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS15-032 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS15-032 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-032 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-032 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-032 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-032 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-032 Windows Server 2012(Internet Explorer 10)
MS15-032 Windows Server 2012 R2(Internet Explorer 11)
MS15-032 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-032 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-032 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-032 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-032 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-032 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle rich text format files in memory.
Remote code execution vulnerabilities exist in Microsoft Office software that are caused when the Office software improperly handles objects in memory while parsing specially crafted Office files.
An elevation of privilege vulnerability exists in the Microsoft Outlook for Mac app that is caused when the software improperly sanitizes HTML strings.
Microsoft has released a security update that addresses the vulnerabilities by correcting how Microsoft Office parses specially crafted files, by correcting how Office handles files in memory, and by helping to ensure that SharePoint Server properly sanitizes user input.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-033 Microsoft Office 2007 Service Pack 3(Microsoft Word 2007 Service Pack 3)
MS15-033 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Word 2010 Service Pack 2 (32-bit editions))
MS15-033 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-033 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Word 2010 Service Pack 2 (64-bit editions))
MS15-033 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-033 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Word 2013 Service Pack 1 (32-bit editions))
MS15-033 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Word 2013 Service Pack 1 (64-bit editions))
MS15-033 Microsoft Office Compatibility Pack Service Pack 3
MS15-033 Microsoft Office Web Apps 2010 Service Pack 2(Microsoft Office Web Apps Server 2010 Service Pack 2)
MS15-033 Microsoft Office Web Apps 2013 Service Pack 1(Microsoft Office Web Apps Server 2013 Service Pack 1)
MS15-033 Microsoft Office for Mac 2011(Microsoft Word for Mac 2011)
MS15-033 Microsoft Office for Mac 2011
MS15-033 Microsoft Outlook for Mac for Office 365
MS15-033 Microsoft SharePoint Server 2010 Service Pack 2(Word Automation Services)
MS15-033 Microsoft SharePoint Server 2013 Service Pack 1(Word Automation Services)
MS15-033 Microsoft Word Viewer
The vulnerability is caused when the HTTP protocol stack (HTTP.sys) improperly parses crafted HTTP requests.
Microsoft has released a security update that addresses the vulnerability by correcting the way that HTTP.sys handles requests.
This security update is rated Critical for supported editions of Windows 7, Windows 8, Windows 2008 R2 and Windows Server 2012.
Refer to MS15-034 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-034 Windows 7 for 32-bit Systems Service Pack 1
MS15-034 Windows 7 for x64-based Systems Service Pack 1
MS15-034 Windows 8 for 32-bit Systems
MS15-034 Windows 8 for x64-based Systems
MS15-034 Windows 8.1 for 32-bit Systems
MS15-034 Windows 8.1 for x64-based Systems
MS15-034 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-034 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-034 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-034 Windows Server 2012
MS15-034 Windows Server 2012
MS15-034 Windows Server 2012 R2
MS15-034 Windows Server 2012 R2
Affected Software:
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
The security update is rated Critical for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-035 Windows 7 for 32-bit Systems Service Pack 1
MS15-035 Windows 7 for x64-based Systems Service Pack 1
MS15-035 Windows Server 2003 Service Pack 2
MS15-035 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-035 Windows Server 2003 x64 Edition Service Pack 2
MS15-035 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-035 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-035 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-035 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-035 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-035 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-035 Windows Vista Service Pack 2
MS15-035 Windows Vista x64 Edition Service Pack 2
Affected Software:
Microsoft SharePoint Server 2013 Service Pack 1
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Project Server 2013 Service Pack 1
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Project Server 2010 Service Pack 2
The security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2010(Office 2010)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
MS15-036 Microsoft SharePoint Server 2013(Project Server 2013)
An elecvation of privilege vulnerability exists in the Task Scheduler due to a known invalid task being present on certain systems.
This security update is rated Important for supported editions of Windows 7 and Windows 2008 R2.
Refer to MS15-037 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-037 Windows 7 for 32-bit Systems Service Pack 1
MS15-037 Windows 7 for x64-based Systems Service Pack 1
MS15-037 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-037 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-037 Windows Server 2008 R2 for x64-based Systems Service Pack 1
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-038 Windows 7 for 32-bit Systems Service Pack 1
MS15-038 Windows 7 for 32-bit Systems Service Pack 1
MS15-038 Windows 7 for x64-based Systems Service Pack 1
MS15-038 Windows 7 for x64-based Systems Service Pack 1
MS15-038 Windows 8 for 32-bit Systems
MS15-038 Windows 8 for 32-bit Systems
MS15-038 Windows 8 for x64-based Systems
MS15-038 Windows 8 for x64-based Systems
MS15-038 Windows 8.1 for 32-bit Systems
MS15-038 Windows 8.1 for 32-bit Systems
MS15-038 Windows 8.1 for x64-based Systems
MS15-038 Windows 8.1 for x64-based Systems
MS15-038 Windows Server 2003 R2 Service Pack 2
MS15-038 Windows Server 2003 R2 x64 Edition Service Pack 2
MS15-038 Windows Server 2003 Service Pack 2
MS15-038 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-038 Windows Server 2003 x64 Edition Service Pack 2
MS15-038 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-038 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-038 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012
MS15-038 Windows Server 2012 R2
MS15-038 Windows Server 2012 R2
MS15-038 Windows Server 2012 R2
MS15-038 Windows Server 2012 R2
MS15-038 Windows Vista Service Pack 2
MS15-038 Windows Vista Service Pack 2
MS15-038 Windows Vista x64 Edition Service Pack 2
MS15-038 Windows Vista x64 Edition Service Pack 2
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if a user opens a specially crafted file.
This security update for Microsoft XML Core Services 3.0 is rated Important for all supported editions of Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-039 Windows 7 for 32-bit Systems Service Pack 1
MS15-039 Windows 7 for x64-based Systems Service Pack 1
MS15-039 Windows Server 2003 Service Pack 2
MS15-039 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-039 Windows Server 2003 x64 Edition Service Pack 2
MS15-039 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-039 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-039 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-039 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-039 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-039 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-039 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-039 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-039 Windows Vista Service Pack 2
MS15-039 Windows Vista x64 Edition Service Pack 2
Refer to MS15-040 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-040 Windows Server 2012 R2(Active Directory Federation Services 3.0)
MS15-040 Windows Server 2012 R2 (Server Core installation)(Active Directory Federation Services 3.0)
An information disclosure vulnerability exists in ASP.NET that is caused when ASP.NET improperly handles certain requests on systems that have custom error messages disabled. An attacker who successfully exploited the vulnerability would be able to view parts of a web configuration file, which could expose sensitive information (CVE-2015-1648).
This security update is rated Important for Microsoft .NET Framework 1.1 Service Pack 1, Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4, Microsoft .NET Framework 4.5, Microsoft .NET Framework 4.5.1, and Microsoft .NET Framework 4.5.2 on affected releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-041 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 8 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8 for 32-bit Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 8 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8 for x64-based Systems(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS15-041 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 1.1 Service Pack 1)
MS15-041 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2003 Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2003 with SP2 for Itanium-based Systems(Microsoft .NET Framework 4)
MS15-041 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2003 x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2012(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012 R2(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS15-041 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.1/4.5.2)
MS15-041 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Vista Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
MS15-041 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS15-041 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4)
MS15-041 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5/4.5.1/4.5.2)
Refer to MS15-042 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-042 Windows 8.1 for x64-based Systems
MS15-042 Windows Server 2012 R2
MS15-042 Windows Server 2012 R2
These new vulnerability checks are included in Qualys vulnerability signature 2.2.985-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.