Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 44 vulnerabilities that were fixed in 14 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 14 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-018 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 10)
MS15-018 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS15-018 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 8)
MS15-018 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 9)
MS15-018 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-018 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-018 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-018 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-018 Windows 8 for 32-bit Systems(Internet Explorer 10)
MS15-018 Windows 8 for x64-based Systems(Internet Explorer 10)
MS15-018 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS15-018 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS15-018 Windows Server 2003 Service Pack 2(Internet Explorer 6)
MS15-018 Windows Server 2003 Service Pack 2(Internet Explorer 7)
MS15-018 Windows Server 2003 Service Pack 2(Internet Explorer 8)
MS15-018 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 6)
MS15-018 Windows Server 2003 with SP2 for Itanium-based Systems(Internet Explorer 7)
MS15-018 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 6)
MS15-018 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 7)
MS15-018 Windows Server 2003 x64 Edition Service Pack 2(Internet Explorer 8)
MS15-018 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Internet Explorer 8)
MS15-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 10)
MS15-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS15-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 8)
MS15-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 9)
MS15-018 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 7)
MS15-018 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 8)
MS15-018 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS15-018 Windows Server 2008 for Itanium-based Systems Service Pack 2(Internet Explorer 7)
MS15-018 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 7)
MS15-018 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 8)
MS15-018 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS15-018 Windows Server 2012(Internet Explorer 10)
MS15-018 Windows Server 2012 R2(Internet Explorer 11)
MS15-018 Windows Vista Service Pack 2(Internet Explorer 7)
MS15-018 Windows Vista Service Pack 2(Internet Explorer 8)
MS15-018 Windows Vista Service Pack 2(Internet Explorer 9)
MS15-018 Windows Vista x64 Edition Service Pack 2(Internet Explorer 7)
MS15-018 Windows Vista x64 Edition Service Pack 2(Internet Explorer 8)
MS15-018 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
This security update is rated Critical for affected versions of the VBScript scripting engine on affected Windows clients and Moderate for affected versions of the VBScript scripting engine on affected Windows servers.
Please refer to MS15-019 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-019 Windows Server 2003 Service Pack 2(VBScript 5.6)
MS15-019 Windows Server 2003 Service Pack 2(VBScript 5.7)
MS15-019 Windows Server 2003 with SP2 for Itanium-based Systems(VBScript 5.6)
MS15-019 Windows Server 2003 with SP2 for Itanium-based Systems(VBScript 5.7)
MS15-019 Windows Server 2003 x64 Edition Service Pack 2(VBScript 5.6)
MS15-019 Windows Server 2003 x64 Edition Service Pack 2(VBScript 5.7)
MS15-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(VBScript 5.8)
MS15-019 Windows Server 2008 for 32-bit Systems Service Pack 2(VBScript 5.7)
MS15-019 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS15-019 Windows Server 2008 for Itanium-based Systems Service Pack 2(VBScript 5.7)
MS15-019 Windows Server 2008 for x64-based Systems Service Pack 2(VBScript 5.7)
MS15-019 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS15-019 Windows Vista Service Pack 2(VBScript 5.7 )
MS15-019 Windows Vista x64 Edition Service Pack 2(VBScript 5.7)
A remote code execution vulnerability exists when Microsoft Windows improperly handles the loading of DLL files. This vulnerability requires a user to open a file contained within the same working directory as a specially crafted DLL file.
Microsoft has released security updates that address the vulnerabilities by correcting how Microsoft Text Services handles objects in memory and how Microsoft Windows handles the loading of DLL files.
This security update is rated Critical for all supported releases of Microsoft Windows.
QID Detection Logic (Authenticated)
This detection reviews the file version of the shell32.dll and msctf.dll files.
Note: Windows XP is end of life and is vulnerable to this issue. For further details see Exploits Against Obsolete Software.
Workaround:
1) Disable the displaying of icons for shortcuts.
Impact of workaround #1: The system may display most icons as a "white" default object icon, which does impact usability.
2) Disable the WebClient service
Impact of workaround #2: When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the Web Client service will not start, and an error message will be logged in the System log.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-020 Windows 7 for 32-bit Systems Service Pack 1
MS15-020 Windows 7 for 32-bit Systems Service Pack 1
MS15-020 Windows 7 for x64-based Systems Service Pack 1
MS15-020 Windows 7 for x64-based Systems Service Pack 1
MS15-020 Windows 8 for 32-bit Systems
MS15-020 Windows 8 for 32-bit Systems
MS15-020 Windows 8 for x64-based Systems
MS15-020 Windows 8 for x64-based Systems
MS15-020 Windows 8.1 for 32-bit Systems
MS15-020 Windows 8.1 for 32-bit Systems
MS15-020 Windows 8.1 for x64-based Systems
MS15-020 Windows 8.1 for x64-based Systems
MS15-020 Windows Server 2003 Service Pack 2
MS15-020 Windows Server 2003 Service Pack 2
MS15-020 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-020 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-020 Windows Server 2003 x64 Edition Service Pack 2
MS15-020 Windows Server 2003 x64 Edition Service Pack 2
MS15-020 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-020 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-020 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-020 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-020 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-020 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-020 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-020 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-020 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-020 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-020 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-020 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-020 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-020 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-020 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-020 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-020 Windows Server 2012
MS15-020 Windows Server 2012
MS15-020 Windows Server 2012
MS15-020 Windows Server 2012
MS15-020 Windows Server 2012 R2
MS15-020 Windows Server 2012 R2
MS15-020 Windows Server 2012 R2
MS15-020 Windows Server 2012 R2
MS15-020 Windows Vista Service Pack 2
MS15-020 Windows Vista Service Pack 2
MS15-020 Windows Vista x64 Edition Service Pack 2
MS15-020 Windows Vista x64 Edition Service Pack 2
A denial of service vulnerability exists in how the Adobe Font Driver manages memory when parsing fonts.
Multiple information disclosure vulnerabilities exist in the Adobe Font Driver that could allow the disclosure of memory contents to an attacker. These vulnerabilities are caused when the Adobe Font Driver tries to read or display certain fonts.
Multiple remote code execution vulnerabilities exist in the Adobe Font Driver. The vulnerabilities are caused when the Adobe Font Driver improperly overwrites objects in memory.
Microsoft has release a security update that addresses these vulnerabilities by correcting how the font parser allocates memory and by correcting how objects in memory are handled.
This security update is rated Critical for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-021 Windows 7 for 32-bit Systems Service Pack 1
MS15-021 Windows 7 for x64-based Systems Service Pack 1
MS15-021 Windows 8 for 32-bit Systems
MS15-021 Windows 8 for x64-based Systems
MS15-021 Windows 8.1 for 32-bit Systems
MS15-021 Windows 8.1 for x64-based Systems
MS15-021 Windows Server 2003 Service Pack 2
MS15-021 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-021 Windows Server 2003 x64 Edition Service Pack 2
MS15-021 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-021 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-021 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-021 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-021 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-021 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-021 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-021 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-021 Windows Server 2012
MS15-021 Windows Server 2012
MS15-021 Windows Server 2012 R2
MS15-021 Windows Server 2012 R2
MS15-021 Windows Vista Service Pack 2
MS15-021 Windows Vista x64 Edition Service Pack 2
A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle rich text format files in memory (CVE-2015-0086).
A remote code execution vulnerability exists in Microsoft Office software that is caused when the Office software improperly handles objects in memory while parsing specially crafted Office files. This could corrupt system memory in such a way as to allow an attacker to execute arbitrary code (CVE-2015-0097).
Elevation of privilege vulnerabilities exist when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server (CVE-2015-1633, CVE-2015-1636).
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-022 Microsoft Excel Viewer
MS15-022 Microsoft Office 2007 Service Pack 3(Microsoft Excel 2007 Service Pack 3)
MS15-022 Microsoft Office 2007 Service Pack 3(Microsoft PowerPoint 2007 Service Pack 3)
MS15-022 Microsoft Office 2007 Service Pack 3(Microsoft Word 2007 Service Pack 3)
MS15-022 Microsoft Office 2007 Service Pack 3
MS15-022 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Excel 2010 Service Pack 2 (32-bit editions))
MS15-022 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions))
MS15-022 Microsoft Office 2010 Service Pack 2 (32-bit editions)(Microsoft Word 2010 Service Pack 2 (32-bit editions))
MS15-022 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-022 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-022 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-022 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS15-022 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Excel 2010 Service Pack 2 (64-bit editions))
MS15-022 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions))
MS15-022 Microsoft Office 2010 Service Pack 2 (64-bit editions)(Microsoft Word 2010 Service Pack 2 (64-bit editions))
MS15-022 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-022 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-022 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-022 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS15-022 Microsoft Office 2013 (32-bit editions)(Microsoft Word 2013 (32-bit editions))
MS15-022 Microsoft Office 2013 (32-bit editions)
MS15-022 Microsoft Office 2013 (64-bit editions)(Microsoft Word 2013 (64-bit editions))
MS15-022 Microsoft Office 2013 (64-bit editions)
MS15-022 Microsoft Office 2013 Service Pack 1 (32-bit editions)(Microsoft Word 2013 Service Pack 1 (32-bit editions))
MS15-022 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS15-022 Microsoft Office 2013 Service Pack 1 (64-bit editions)(Microsoft Word 2013 Service Pack 1 (64-bit editions))
MS15-022 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS15-022 Microsoft Office Compatibility Pack Service Pack 3
MS15-022 Microsoft Office Compatibility Pack Service Pack 3
MS15-022 Microsoft Office Web Apps 2010 Service Pack 2(Microsoft Office Web Apps Server 2010 Service Pack 2)
MS15-022 Microsoft Office Web Apps 2010 Service Pack 2(Microsoft Web Applications 2010 Service Pack 2)
MS15-022 Microsoft Office Web Apps 2013(Microsoft Office Web Apps Server 2013)
MS15-022 Microsoft Office Web Apps 2013 Service Pack 1(Microsoft Office Web Apps Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)
MS15-022 Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)
MS15-022 Microsoft SharePoint Server 2010 Service Pack 2(Microsoft SharePoint Foundation 2010 Service Pack 2)
MS15-022 Microsoft SharePoint Server 2010 Service Pack 2(Microsoft SharePoint Server 2010 Service Pack 2)
MS15-022 Microsoft SharePoint Server 2010 Service Pack 2(Word Automation Services)
MS15-022 Microsoft SharePoint Server 2013(Excel Services)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Foundation 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Foundation 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Foundation 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Microsoft SharePoint Server 2013)
MS15-022 Microsoft SharePoint Server 2013(Word Automation Services)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Excel Services)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Foundation 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Foundation 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Foundation 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Microsoft SharePoint Server 2013 Service Pack 1)
MS15-022 Microsoft SharePoint Server 2013 Service Pack 1(Word Automation Services)
MS15-022 Microsoft Windows SharePoint Services 3.0 Service Pack 3 (32-bit versions)
MS15-022 Microsoft Windows SharePoint Services 3.0 Service Pack 3 (64-bit versions)
MS15-022 Microsoft Word Viewer
MS15-022
MS15-022
An elevation of privilege vulnerability exists in the Windows kernel-mode driver that is caused when the kernel-mode driver fails to properly validate the calling threads token. (CVE-2015-0078)
An information disclosure vulnerability exists in the Windows kernel-mode driver that could allow the disclosure of kernel memory contents to an attacker. (CVE-2015-0077, CVE-2015-0094, CVE-2015-0095)
The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges.
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-023 Windows 7 for 32-bit Systems Service Pack 1
MS15-023 Windows 7 for x64-based Systems Service Pack 1
MS15-023 Windows 8 for 32-bit Systems
MS15-023 Windows 8 for x64-based Systems
MS15-023 Windows 8.1 for 32-bit Systems
MS15-023 Windows 8.1 for x64-based Systems
MS15-023 Windows Server 2003 Service Pack 2
MS15-023 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-023 Windows Server 2003 x64 Edition Service Pack 2
MS15-023 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-023 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-023 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-023 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-023 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-023 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-023 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-023 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-023 Windows Server 2012
MS15-023 Windows Server 2012
MS15-023 Windows Server 2012 R2
MS15-023 Windows Server 2012 R2
MS15-023 Windows Vista Service Pack 2
MS15-023 Windows Vista x64 Edition Service Pack 2
Microsoft has released a security update that addresses the vulnerability correcting how Windows processes PNG image format files.
The security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-024 Windows 7 for 32-bit Systems Service Pack 1
MS15-024 Windows 7 for x64-based Systems Service Pack 1
MS15-024 Windows 8 for 32-bit Systems
MS15-024 Windows 8 for x64-based Systems
MS15-024 Windows 8.1 for 32-bit Systems
MS15-024 Windows 8.1 for x64-based Systems
MS15-024 Windows Server 2003 Service Pack 2
MS15-024 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-024 Windows Server 2003 x64 Edition Service Pack 2
MS15-024 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-024 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-024 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-024 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-024 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-024 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-024 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-024 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-024 Windows Server 2012
MS15-024 Windows Server 2012
MS15-024 Windows Server 2012 R2
MS15-024 Windows Server 2012 R2
MS15-024 Windows Vista Service Pack 2
MS15-024 Windows Vista x64 Edition Service Pack 2
Affected Software:
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-025 Windows 7 for 32-bit Systems Service Pack 1
MS15-025 Windows 7 for x64-based Systems Service Pack 1
MS15-025 Windows 8 for 32-bit Systems
MS15-025 Windows 8 for x64-based Systems
MS15-025 Windows 8.1 for 32-bit Systems
MS15-025 Windows 8.1 for x64-based Systems
MS15-025 Windows Server 2003 Service Pack 2
MS15-025 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-025 Windows Server 2003 x64 Edition Service Pack 2
MS15-025 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-025 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-025 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-025 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-025 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-025 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-025 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-025 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-025 Windows Server 2012
MS15-025 Windows Server 2012
MS15-025 Windows Server 2012 R2
MS15-025 Windows Server 2012 R2
MS15-025 Windows Vista Service Pack 2
MS15-025 Windows Vista x64 Edition Service Pack 2
Affected Software:
Microsoft Exchange Server 2013 Service Pack 1
Microsoft Exchange Server 2013 Cumulative Update 7
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-026 Microsoft Exchange Server 2013 Cumulative Update 7
MS15-026 Microsoft Exchange Server 2013 Service Pack 1
The vulnerability could allow spoofing if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system.
This security update is rated Important for all supported editions of Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows 2012, and Windows 2012 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-027 Windows Server 2003 Service Pack 2
MS15-027 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-027 Windows Server 2003 x64 Edition Service Pack 2
MS15-027 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-027 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-027 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-027 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-027 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-027 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-027 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-027 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-027 Windows Server 2012
MS15-027 Windows Server 2012
MS15-027 Windows Server 2012 R2
MS15-027 Windows Server 2012 R2
A security feature bypass vulnerability exists when Windows Task Scheduler fails to properly validate and enforce impersonation levels.
Affected Software:
Windows 7 Service Pack 1
Windows Server 2008 R2 Service Pack 1
Windows 8 and Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT and Windows RT 8.1
This security update is rated Important.
Refer to MS15-028 for further information.
Workaround:
Turn off the Task Scheduler service.
Impact of workaround. Scheduled tasks will no longer run.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-028 Windows 7 for 32-bit Systems Service Pack 1
MS15-028 Windows 7 for x64-based Systems Service Pack 1
MS15-028 Windows 8 for 32-bit Systems
MS15-028 Windows 8 for x64-based Systems
MS15-028 Windows 8.1 for 32-bit Systems
MS15-028 Windows 8.1 for x64-based Systems
MS15-028 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-028 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-028 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-028 Windows Server 2012
MS15-028 Windows Server 2012
MS15-028 Windows Server 2012 R2
MS15-028 Windows Server 2012 R2
Affected Software:
Windows Vista Service Pack 2
Windows 7 Service Pack 1
Windows Server 2008 R2 Service Pack 1
Windows Server 2008 Service Pack 2
Windows 8 and Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT and Windows RT 8.1
This security update is rated Important.
Refer to MS15-029 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-029 Windows 7 for 32-bit Systems Service Pack 1
MS15-029 Windows 7 for x64-based Systems Service Pack 1
MS15-029 Windows 8 for 32-bit Systems
MS15-029 Windows 8 for x64-based Systems
MS15-029 Windows 8.1 for 32-bit Systems
MS15-029 Windows 8.1 for x64-based Systems
MS15-029 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-029 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-029 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-029 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-029 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-029 Windows Server 2012
MS15-029 Windows Server 2012 R2
MS15-029 Windows Vista Service Pack 2
MS15-029 Windows Vista x64 Edition Service Pack 2
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker creates multiple RDP sessions that fail to properly free objects in memory.
This security update is rated Important for all supported editions of Windows 7, Windows 8, Windows Server 2012, Window 8.1, and Windows Server 2012 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-030 Windows 7 for 32-bit Systems Service Pack 1
MS15-030 Windows 7 for 32-bit Systems Service Pack 1
MS15-030 Windows 7 for x64-based Systems Service Pack 1
MS15-030 Windows 7 for x64-based Systems Service Pack 1
MS15-030 Windows 8 for 32-bit Systems
MS15-030 Windows 8 for x64-based Systems
MS15-030 Windows 8.1 for 32-bit Systems
MS15-030 Windows 8.1 for x64-based Systems
MS15-030 Windows Server 2012
MS15-030 Windows Server 2012
MS15-030 Windows Server 2012 R2
MS15-030 Windows Server 2012 R2
Affected Operating Systems:
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8 for 32-bit Systems
Windows 8 for x64-based Systems
Windows 8.1 for 32-bit Systems
Windows 8.1 for x64-based Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT
Windows RT 8.1
Please refer to MS15-031 for details.
Workaround:
Disable RSA key exchange ciphers using the Group Policy Object Editor (Windows Vista and later systems only)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS15-031 Windows 7 for 32-bit Systems Service Pack 1
MS15-031 Windows 7 for x64-based Systems Service Pack 1
MS15-031 Windows 8 for 32-bit Systems
MS15-031 Windows 8 for x64-based Systems
MS15-031 Windows 8.1 for 32-bit Systems
MS15-031 Windows 8.1 for x64-based Systems
MS15-031 Windows Server 2003 Service Pack 2
MS15-031 Windows Server 2003 with SP2 for Itanium-based Systems
MS15-031 Windows Server 2003 x64 Edition Service Pack 2
MS15-031 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS15-031 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-031 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS15-031 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-031 Windows Server 2008 for 32-bit Systems Service Pack 2
MS15-031 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS15-031 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-031 Windows Server 2008 for x64-based Systems Service Pack 2
MS15-031 Windows Server 2012
MS15-031 Windows Server 2012
MS15-031 Windows Server 2012 R2
MS15-031 Windows Server 2012 R2
MS15-031 Windows Vista Service Pack 2
MS15-031 Windows Vista x64 Edition Service Pack 2
These new vulnerability checks are included in Qualys vulnerability signature 2.2.957-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.