|Date: 10 March 2015CIS/MS-ISAC ADVISORY NUMBER: 2015-024
DATE(S) ISSUED: 03/10/2015SUBJECT: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (MS15-020)EXECUTIVE SUMMARY:
Multiple vulnerabilities have been discovered in Microsoft Windows that could allow for remote code execution. The kernel mode drivers control window displays, screen output, and input from devices that the kernel passes to applications. This vulnerability can be exploited when a user opens a specially crafted website, file or opens a file in a working directory that contains a specially crafted DLL file. An attacker could then install programs; view, change, or delete data; or create new accounts with full system rights.
There are no reports of these vulnerabilities being exploited in the wild.
・ Windows Server 2003
・ Windows Server 2008
・ Windows Server 2008 R2
・ Windows Server 2012
・ Windows Server 2012 R2
・ Windows Server Core
・ Windows RT
・ Windows RT 8.1
・ Windows Vista
・ Windows 7
・ Windows 8
・ Windows 8.1
• Large and medium government entities: High
• Small government entities: High
• Large and medium business entities: High
• Small business entities: High
• Home users: High
TECHNICAL SUMMARY:Two vulnerabilities have been privately reported in Microsoft Windows that could allow for remote code execution.
・ A remote code execution exists in Windows Text Services when it improperly handles objects in memory. This vulnerability may be exploited if an attacker convinces a user to open a specially crafted website or file. (CVE-2015-0081)
・ A remote code execution exists in Microsoft Windows when DLL files are improperly handled. This vulnerability may be exploited if an attacker convinces a user to open a file in the same directory as a specially crafted DLL file. (CVE-2015-0096)
Successful exploitation could allow an attacker to gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
RECOMMENDATIONS: We recommend the following actions be taken:
・ Contact AIS to coordinate to apply appropriate patches or workaround provided by Microsoft to vulnerable systems immediately.
・ Do not visit untrusted websites or follow links provided by unknown or untrusted sources.
・ Do not open email attachments from unknown or untrusted sources.
NOTE: AIS Managed Services clients do not need to take any action as this issue has already been remediated. For more information on AIS Managed Services, please contact Paul Armstrong or call toll-free: (844) AIS-LABS (247-5227)
Leave a comment