February 2015 - Microsoft Releases 9 Security Advisories

  Severity: HIGH
  Advisory Date: FEB 10, 2015

  DESCRIPTION

Microsoft addresses the following vulnerabilities in its February batch of patches:

  • (MS15-009) Security Update for Internet Explorer (3034682)
    Risk Rating: Critical

    This security update resolves one publicly disclosed and forty privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user.


  • (MS15-010) Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution (3036220)
    Risk Rating: Critical

    This security update resolves one publicly disclosed and five privately reported vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or visit an untrusted website that contains embedded TrueType fonts.


  • (MS15-011) Vulnerability in Group Policy Could Allow Remote Code Execution (3000483)
    Risk Rating: Critical

    This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker convinces a user with a domain-configured system to connect to an attacker-controlled network. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.


  • (MS15-012) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3032328)
    Risk Rating: Important

    This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user.


  • (MS15-013) Vulnerability in Microsoft Office Could Allow Security Feature Bypass (3033857)
    Risk Rating: Important

    This security update resolves one publicly disclosed vulnerability in Microsoft Office. The vulnerability could allow security feature bypass if a user opens a specially crafted Microsoft Office file. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this security feature bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, to run arbitrary code.


  • (MS15-014) Vulnerability in Group Policy Could Allow Security Feature Bypass (3004361)
    Risk Rating: Important

    This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker, by way of a man-in-the-middle attack, causes the Group Policy Security Configuration Engine policy file on a targeted system to become corrupted or otherwise unreadable.


  • (MS15-015) Vulnerability in Microsoft Windows Could Allow Elevation of Privilege (3031432)
    Risk Rating: Important

    This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to leverage the lack of impersonation-level security checks to elevate privileges during process creation. An authenticated attacker who successfully exploited this vulnerability could acquire administrator credentials and use them to elevate privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.


  • (MS15-016) Vulnerability in Microsoft Graphics Component Could Allow Information Disclosure (3029944)
    Risk Rating: Important

    This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted TIFF image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.


  • (MS15-017)Vulnerability in Virtual Machine Manager Could Allow Elevation of Privilege (3035898)
    Risk Rating: Important

    This security update resolves a privately reported vulnerability in Virtual Machine Manager (VMM). The vulnerability could allow elevation of privilege if an attacker logs on an affected system. An attacker must have valid Active Directory logon credentials and be able to log on with those credentials to exploit the vulnerability.


  •   TREND MICRO PROTECTION INFORMATION

    Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using the Vulnerability Protection product or OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.

    MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date Vulnerability Protection and IDF Compatibility
    MS15-009 CVE-2014-8967 1006403 Microsoft Internet Explorer 'display:run-in' Use-After-Free Remote Code Execution Vulnerability 11-Dec-15 YES
    MS15-009 CVE-2015-0017 1006475 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0018 1006476 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0019 1006478 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0020 1006480 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0021 1006483 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0022 1006474 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0023 1006477 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0025 1006502 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0026 1006511 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0029 1006479 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0030 1006481 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0035 1006484 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0036 1006489 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0037 1006504 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0038 1006505 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0038 1006508 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0039 1006487 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0040 1006488 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0041 1006490 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0042 1006492 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0043 1006501 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0044 1006495 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0045 1006497 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0046 1006499 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0048 1006491 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0049 1006493 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0050 1006503 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0051 1006494 Microsoft Internet Explorer ASLR Bypass Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0052 1006496 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0053 1006498 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0067 1006500 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0068 1006507 Microsoft Internet Explorer Memory Corruption Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0070 1006486 Microsoft Internet Explorer Cross Domain Information Disclosure Vulnerability 10-Feb-15 YES
    MS15-009 CVE-2015-0071 1006506 Microsoft Internet Explorer ASLR Bypass Vulnerability 10-Feb-15 YES
    MS15-012 CVE-2015-0063 1006470 Microsoft Excel Remote Code Execution Vulnerability 10-Feb-15 YES
    MS15-012 CVE-2015-0064 1006471 Microsoft Office Remote Code Execution Vulnerability 10-Feb-15 YES
    MS15-012 CVE-2015-0065 1006473 Microsoft OneTableDocumentStream Remote Code Execution Vulnerability 10-Feb-15 YES
    MS15-016 CVE-2015-0061 1006482 Microsoft Windows TIFF Processing Information Disclosure Vulnerability 10-Feb-15 YES

      SOLUTION

    Featured Stories