Microsoft Patches Security Vulnerabilities
Thursday, September 10, 2015 @ 05:09 PM gHale
Microsoft released 12 security bulletins to patch more than 50 vulnerabilities.
The vulnerabilities affect Windows, Internet Explorer, Edge, Office, Lync, Exchange Server, .NET Framework, Exchange Server, and Skype for Business Server.
Of the 12 bulletins, five rated as critical while the remaining 7 listed as important.
Attackers are using one flaw, a Win32k memory corruption issue can end up exploited for privilege escalation (CVE-2015-2546). The vulnerability affects all supported versions of Windows, including Windows 10. Microsoft addressed this and three other Win32k memory corruption flaws by improving the way the Windows kernel-mode driver handles objects in memory.
Microsoft said four other vulnerabilities ended up disclosed publicly: A kernel ASLR bypass (CVE-2015-2529), a Windows Media Center RCE vulnerability (CVE-2015-2509), a .NET Framework integer overflow (CVE-2015-2504), and a memory corruption flaw in Edge and Internet Explorer (CVE-2015-2542).
The .NET integer overflow ended up disclosed in May by Dutch security firm Securify, but Microsoft hasn’t released a patch because the bug is difficult to exploit.
The Media Center vulnerability came to light earlier this year following the breach suffered by Italian spyware maker Hacking Team. A leaked email referencing the exploit revealed an attacker can execute arbitrary code by getting the targeted user to open a specially crafted Media Center link (.mcl) file.
Trend Micro reported this vulnerability to Microsoft on July 18 after finding the Media Center exploit in the Hacking Team leak.
Other critical security bulletins released by Microsoft on Tuesday fix holes in Internet Explorer, Edge, Windows Journal, and Office.
The bulletins rated “important” address a denial-of-service (DoS) bug in Active Directory, privilege escalation flaws in the task manager, information disclosure and spoofing issues in Exchange Server, cross-site scripting (XSS) flaws in Lync Server and Skype for Business Server, and a Windows Hyper-V security feature bypass vulnerability.