Microsoft Script Engines Memory Corruption Vulnerability Fixed by MS16-001 and MS16-003


Description   (:A memory corruption vulnerability was reported in JScript and VBScript Scripting Engines.:A remote attacker could exploit them by enticing their victim into visiting a specially formed web page in order to execute arbitrary code with victim's rights.::This vulnerability stems from an improper handle of objects in memory.)
     
Vulnerable Products   Vulnerable OS:
Windows 2008 (Microsoft) - Itanium-based Server SP2, Server SP2, X64 Edition SP2Windows Vista (Microsoft) - 32 bits SP2, X64 Edition SP2Vulnerable Software:
Internet Explorer (Microsoft) - 10, 10, 10, 10, 10, ..., 9.0, 9.0, 9.0, 9.0, 9.0
     
Solution   cacls %windir%\syswow64\vbscript.dll /E /R everyone
     
CVE   CVE-2016-0002
     
References   - MS16-001 : Cumulative Security Update for Internet Explorer
https://technet.microsoft.com/library/en-us/security/MS16-001
- MS16-003 : Cumulative Security Update for JScript and VBScript to Address Remote Code Execution
https://technet.microsoft.com/library/en-us/security/MS16-003
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Web 2.0 : Detection of visual basic script embedded in web page
5.0.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2016-01-12 

 Target Type 
Client 

 Possible exploit 
Remote