It's 2015 and a RICH TEXT FILE or a HTTP request can own your Windows machine

Patch now before someone writes exploits for these bugs


Microsoft has delivered its latest monthly batch of security updates to address flaws in Windows, Office and Internet Explorer.

Redmond's latest Patch Tuesday payload includes 11 bulletins, four of which are rated critical as they allow attackers to execute malicious code on victims' computers from across the internet. The full list is as follows:

  • MS15-032 Critical bulletin containing patches for 10 vulnerabilities in Internet Explorer. The bulletin is a cumulative update for Internet Explorer versions 6-11. Opening a malicious webpage that exploits one of these bugs to pull off a remote-code execution attack will compromise your computer unless you patch.
  • MS15-033 Critical bulletin addressing five CVE-listed vulnerabilities (CVE-2015-1641, CVE-2015-1649, CVE-2015-1650, CVE-2015-1651, CVE-2015-1639) in Office 2007-2013 as well as Office for Mac. Opening a dodgy rich text file or Office document could lead to code execution with the privileges of the logged-in user.
  • MS15-034 Critical fix for a remote code execution vulnerability (CVE-2015-1635) in HTTP.sys for Windows 7 and 8 as well as Server 2008 and Server 2012. Sending a malicious HTTP request to a Windows box running the IIS web server can fool the system into executing your malicious code.
  • MS15-035 Critical update for CVE-2015-1645, a flaw in the Microsoft Graphics Component in Windows Server 2003, 2008, Windows Vista and Windows 7. Windows 8 and Windows Server 2012 are not listed as vulnerable to the flaw. Opening an EMF file can trigger remote-code execution.
  • MS15-036 Important update for two SharePoint Server elevation of privilege vulnerabilities (CVE-2015-1640 and CVE-2015-1653). Applies to SharePoint Server 2010 and 2013.
  • MS15-037 Important bulletin for an elevation of privilege flaw (CVE-2015-0098) in Windows Task Scheduler. The fix applies to Windows 7 and Server 2008 R2.
  • MS15-038 Important fix for a elevation of privilege vulnerabilities (CVE-2015-1643 and CVE-2015-1644) in Windows Vista, 7, 8, 8.1, RT and Windows Server 2003, 2008 and 2012.
  • MS15-039 Important bulletin to address a security bypass hole (CVE-2015-1646) in XML Core Services on Windows Vista and Windows 7 as well as Server 2003 and Server 2008.
  • MS15-040 Important bulletin for an information disclosure flaw (CVE-2015-1638) in Active Directory for Windows Server 2012 R2.
  • MS15-041 Important information disclosure vulnerability (CVE-2015-1648) in .Net Framework on Windows Vista through Windows 8.1 and Server 2003-2012.
  • MS15-042 Important denial of service vulnerability ((CVE-2015-1647) in Hyper-V for Windows 8.1 and Windows Server 2012 R2.

Microsoft thanks those who reported the aforementioned programming blunders, right here. One of the security updates for Internet Explorer 11 also disables SSL 3.0 support, leaving users with the more secure TLS 1.2 for HTTPS connections, but enterprises can override this.

Meanwhile, Adobe has posted its own scheduled security update to address vulnerabilities in its Flash Player. The patch addresses 22 different CVE-listed vulnerabilities including remote-code execution flaws via malicious Flash files.

Adobe said its update should be a top deployment priority for the Windows, OS X and Linux versions of Flash Player – the bug CVE-2015-3043 is being exploited in the wild by miscreants.

Users and administrators are advised to test (if necessary) and install the Microsoft and Adobe patches as soon as possible in order to reduce the risk of attack. Now these patches are available, hackers will be reverse engineering them to develop exploits against those too slow to upgrade. ®


Other stories you might like

  • AMD claims its GPUs beat Nvidia on performance per dollar
    * Terms, conditions, hardware specs and software may vary – a lot

    As a slowdown in PC sales brings down prices for graphics cards, AMD is hoping to win over the market's remaining buyers with a bold, new claim that its latest Radeon cards provide better performance for the dollar than Nvidia's most recent GeForce cards.

    In an image tweeted Monday by AMD's top gaming executive, the chip designer claims its lineup of Radeon RX 6000 cards provide better performance per dollar than competing ones from Nvidia, with all but two of the ten cards listed offering advantages in the double-digit percentages. AMD also claims to provide better performance for the power required by each card in all but two of the cards.

    Continue reading
  • Google opens the pod doors on Bay View campus
    A futuristic design won't make people want to come back – just ask Apple

    After nearly a decade of planning and five years of construction, Google is cutting the ribbon on its Bay View campus, the first that Google itself designed.

    The Bay View campus in Mountain View – slated to open this week – consists of two office buildings (one of which, Charleston East, is still under construction), 20 acres of open space, a 1,000-person event center and 240 short-term accommodations for Google employees. The search giant said the buildings at Bay View total 1.1 million square feet. For reference, that's less than half the size of Apple's spaceship. 

    The roofs on the two main buildings, which look like pavilions roofed in sails, were designed that way for a purpose: They're a network of 90,000 scale-like solar panels nicknamed "dragonscales" for their layout and shimmer. By scaling the tiles, Google said the design minimises damage from wind, rain and snow, and the sloped pavilion-like roof improves solar capture by adding additional curves in the roof. 

    Continue reading
  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module
    Anything that uses proximity-based BLE is vulnerable, claim researchers

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

    Essentially, what happens is this: the paired smartphone should be physically close by the Tesla to unlock it. NCC's technique involves one gadget near the paired phone, and another gadget near the car. The phone-side gadget relays signals from the phone to the car-side gadget, which forwards them to the vehicle to unlock and start it. This shouldn't normally happen because the phone and car are so far apart. The car has a defense mechanism – based on measuring transmission latency to detect that a paired device is too far away – that ideally prevents relayed signals from working, though this can be defeated by simply cutting the latency of the relay process.

    Continue reading

Biting the hand that feeds IT © 1998–2022