MS15-126: Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3116178)

high Nessus Plugin ID 87255

Synopsis

The remote Windows host is affected by multiple vulnerabilities.

Description

The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities :

- An information disclosure vulnerability exists in VBScript due to the improper disclosure of memory contents. An attacker can exploit this to gain information that can be used to further compromise a user's computer or data. (CVE-2015-6135)

- A remote code execution vulnerability exists related to the way the VBScript engine renders when handling objects in memory in Internet Explorer. A remote attacker can exploit this, via a crafted web page, document, or application, to gain elevated privileges and take full control of an affected system.
(CVE-2015-6136)

Solution

Microsoft has released a set of patches for Vista, 2008, and 2008 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-126

Plugin Details

Severity: High

ID: 87255

File Name: smb_nt_ms15-126.nasl

Version: 1.10

Type: local

Agent: windows

Published: 12/8/2015

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 12/8/2015

Vulnerability Publication Date: 12/8/2015

Reference Information

CVE: CVE-2015-6135, CVE-2015-6136

BID: 78538, 78540

MSFT: MS15-126

MSKB: 3105578, 3105579, 3116178