HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon FAQs on Cyberoam and Sophos Firewall
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Microsoft Security Bulletin Release for January 2015
DrillDown Icon Microsoft Security Bulletin Release for December 2014
DrillDown Icon Microsoft Security Bulletin Release for November 2014
DrillDown Icon Microsoft Security Bulletin Release for October 2014
DrillDown Icon Product Vulnerabilities Advisories
DrillDown Icon SSLv3.0 POODLE Vulnerability Fix
DrillDown Icon Microsoft Security Bulletin Release for September 2014
DrillDown Icon DTLS Memory Exhaustion Vulnerability in OpenSSL
DrillDown Icon SRP Buffer Overrun Vulnerability in OpenSSL
DrillDown Icon Microsoft Security Bulletin Release for August 2014
DrillDown Icon Microsoft Security Bulletin Release for July 2014
DrillDown Icon Microsoft Security Bulletin Release for June 2014
DrillDown Icon Multiple Vulnerabilities in OpenSSL
DrillDown Icon Adaptive Computing TORQUE pbs_server count Value Validation Buffer Overflow
DrillDown Icon Linux Kernel Race Condition DoS Vulnerability
DrillDown Icon Apache ‘mod_wsgi’ Information Disclosure Vulnerability
DrillDown Icon Multiple Vulnerabilities in Cisco NX-OS
DrillDown Icon HP Release Control Authenticated Privilege Escalation
DrillDown Icon Symantec Workspace Streaming XML-RPC Arbitrary File Upload
DrillDown Icon Multiple Vulnerabilities in ASUS RT series routers
DrillDown Icon Remote Code Execution Vulnerability in Oracle Java
DrillDown Icon Mozilla Firefox TypeObject Use-after-free Vulnerability
DrillDown Icon OpenSSL Heartbleed Vulnerability Fix
DrillDown Icon Internet Explorer Memory Corruption Vulnerability
DrillDown Icon Adobe Flash Player Buffer Overflow Vulnerability
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils for Cyberoam security appliances
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
 
Microsoft Security Bulletin Release for January 2015

Security Advisory

 

Original Publication Date: 19-01-2015

 

Microsoft published its monthly Security Bulletin on January 13, 2015. Eight (8) bulletins were released that addressed a total of Eight (8) vulnerabilities. The bulletins described vulnerabilities in Microsoft Windows Operating System and components. The vulnerabilities could allow an attacker to allow elevation of privilege, execute remote code execution, allow security feature bypass or cause denial of service.

 

Cyberoam Solution:

 

Cyberoam Threat Research Labs is currently studying the vulnerabilities. The Security Advisory will be updated as additional information is available.

 

The following table provides general information on the vulnerabilities described in the Microsoft Security Bulletins.
 
Microsoft Security Bulletin ID
CVE ID
Severity
Attack Vectors
Affected Products
MS15-008
 
CVE-2015-0011
High
To exploit this vulnerability, an attacker would first have to log on to the system and then run a specially crafted application. User interaction is required to exploit this vulnerability.
Microsoft Windows
MS15-007
 
CVE-2015-0015
Important
An unauthenticated attacker who successfully exploited this vulnerability could send specially crafted username strings to an Internet Authentication Service (IAS) or Network Policy Server (NPS), causing a denial of service condition for RADIUS authentication on the IAS or NPS.
Microsoft Windows
MS15-006
CVE-2015-0001
Important
An attacker must have valid logon credentials, and be able to log on locally with administrator privileges to exploit this vulnerability. The update addresses the vulnerability by correcting how WER interacts with processes
Microsoft Windows
MS15-005
CVE-2015-0001
High
An attacker must have valid logon credentials, and be able to log on locally with administrator privileges to exploit this vulnerability. The update addresses the vulnerability by correcting how WER interacts with processes
Microsoft Windows
MS15-004
CVE-2015-0016
High
To successfully exploit this vulnerability, an attacker would have to take advantage of an existing vulnerability in Internet Explorer by tricking a user into downloading a specially crafted application
Microsoft Windows
MS15-003
CVE-2015-0004
High
An authenticated attacker who successfully exploits the vulnerability could leverage the Windows User Profile Service (ProfSvc) to load registry hives associated with other user accounts and potentially execute programs with elevated permissions.
 
Microsoft Windows
 
MS15-002
CVE-2015-0014
Critical
An attacker could attempt to exploit this vulnerability by sending specially crafted telnet packets to a Windows server, and if successful, could then run arbitrary code on the server.
Microsoft Windows
MS15-001
CVE-2015-0002
High
An elevation of privilege vulnerability exists in how the Microsoft Windows Application Compatibility Infrastructure (AppCompat) improperly checks the authorization of the caller's impersonation token. An attacker could attempt to exploit this to run a privileged application.
Microsoft Windows

Revision History

 

Revision 1.0

19 January, 2015

Initial public release containing information on the the vulnerabilities described in the Microsoft Security Bulletins.


Attachments
Article ID: 3096