Microsoft VBScript and JScript Engines Multiple Vulnerabilities Fixed by MS15-106 and MS15-108


Description   (#Several vulnerabilities have been identified in JScript and VBScript Scripting Engines:#- CVE-2015-2482 and CVE-2015-6055: multiple memory corruption. A remote attacker could exploit them by enticing their victim into visiting a specially formed web page in order to execute arbitrary code with victim's rights. These vulnerabilities stems from an improper handling of objects in memory.##- CVE-2015-6059: information disclosure. A remote attacker could exploit it in order to disclose the contents of memory. This vulnerability stems from an improper handling of objects in memory##- CVE-2015-6052: security bypass located in the Address Space Layout Randomization (ASLR) security feature allowing an attacker to more reliably predict the memory offsets of specific instructions in a given call stack.#Updated, 14/10/2015 :#A proof of concept is available for the CVE-2015-2482 vulnerability.#Updated, 10/11/2015:#Further information is available for the CVE-2015-6055 vulnerability:#- CVE-2015-6055: type confusion within the "Join()" function in VBScript.#Updated, 25/04/2016:#A proof of concept is available for the CVE-2015-6055 vulnerability.)
     
Vulnerable Products   Vulnerable OS:
Windows 2008 (Microsoft) - Itanium-based Server SP2, Server SP2, X64 Edition SP2Windows Vista (Microsoft) - 32 bits SP2, X64 Edition SP2Vulnerable Software:
Internet Explorer (Microsoft) - 10, 10, 10, 10, 10, ..., 9.0, 9.0, 9.0, 9.0, 9.0
     
Solution   cacls %windir%\syswow64\jscript.dll /E /R everyone
     
CVE   CVE-2015-6059
CVE-2015-6055
CVE-2015-6052
CVE-2015-2482
     
References   - MS15-106 : Cumulative Security Update for Internet Explorer (3096441)
https://technet.microsoft.com/library/en-us/security/MS15-106
- MS15-108 : Security Update for JScript and VBScript to Address Remote Code Execution (3089659)
https://technet.microsoft.com/en-us/library/en-us/security/MS15-108
- ZDI-15-537 : Microsoft Windows VBScript Join Function Type Confusion Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-15-537/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Web 2.0 : Detection of visual basic script embedded in web page
5.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2015-2482)
6.0.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2015-10-13 

 Target Type 
Client 

 Possible exploit 
Remote