From winvulns-announcements at bigmail.bigfix.com Wed Jan 21 05:21:30 2015 From: winvulns-announcements at bigmail.bigfix.com (Notification of New Vulnerabilties to Windows Systems Fixlet Messages) Date: Wed, 21 Jan 2015 05:21:30 -0800 Subject: [Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems' Message-ID: Fixlet Site - 'Vulnerabilities to Windows Systems' Current Version: 424 Published: Tue, 20 Jan 2015 19:55:18 GMT New Fixlets: ============ *************************************************************** Title: WebDAV elevation of privilege vulnerability - CVE-2015-0011 (MS15-008) Severity: Medium Fixlet ID: 2774301 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval27743.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0011 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: mrxdav.sys (aka the WebDAV driver) in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass an impersonation protection mechanism, and obtain privileges for redirection of WebDAV requests, via a crafted application, aka "WebDAV Elevation of Privilege Vulnerability." *************************************************************** Title: NLA Security Feature Bypass Vulnerability - CVE-2015-0006 (MS15-005) Severity: Medium Fixlet ID: 2829701 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval28297.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0006 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka "NLA Security Feature Bypass Vulnerability." *************************************************************** Title: Microsoft user profile service elevation of privilege vulnerability - CVE-2015-0004 (MS15-003) Severity: High Fixlet ID: 2833001 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval28330.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0004 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The User Profile Service (aka ProfSvc) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges by conducting a junction attack to load another user's UsrClass.dat registry hive, aka MSRC ID 20674 or "Microsoft User Profile Service Elevation of Privilege Vulnerability." *************************************************************** Title: Network policy server RADIUS implementation denial of service vulnerability - CVE-2015-0015 (MS15-007) Severity: High Fixlet ID: 2847801 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval28478.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0015 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Windows Server 2003 SP2, Server 2008 SP2 and R2 SP1, and Server 2012 Gold and R2 allow remote attackers to cause a denial of service (system hang and RADIUS outage) via crafted username strings to (1) Internet Authentication Service (IAS) or (2) Network Policy Server (NPS), aka "Network Policy Server RADIUS Implementation Denial of Service Vulnerability." *************************************************************** Title: Windows Telnet service buffer overflow vulnerability - CVE-2015-0014 (MS15-002) Severity: High Fixlet ID: 2855401 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval28554.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0014 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Buffer overflow in the Telnet service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows Telnet Service Buffer Overflow Vulnerability." *************************************************************** Title: Windows Error Reporting security feature bypass vulnerability - CVE-2015-0001 (MS15-006) Severity: Low Fixlet ID: 2863401 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval28634.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0001 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Windows Error Reporting (WER) component in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass the Protected Process Light protection mechanism and read the contents of arbitrary process-memory locations by leveraging administrative privileges, aka "Windows Error Reporting Security Feature Bypass Vulnerability." *************************************************************** Title: Graphics component information disclosure vulnerability - CVE-2015-0002 (MS15-001) Severity: High Fixlet ID: 2866401 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval28664.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0002 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The AhcVerifyAdminContext function in ahcache.sys in the Application Compatibility component in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not verify that an impersonation token is associated with an administrative account, which allows local users to gain privileges by running AppCompatCache.exe with a crafted DLL file, aka MSRC ID 20544 or "Microsoft Application Compatibility Infrastructure Elevation of Privilege Vulnerability." *************************************************************** Title: Directory Traversal elevation of privilege vulnerability - CVE-2015-0016 (MS15-004) Severity: High Fixlet ID: 2871701 Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval28717.html Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0016 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."