Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (MS15-020)
MS-ISAC ADVISORY NUMBER:2015-024
Multiple vulnerabilities have been discovered in Microsoft Windows that could allow for remote code execution. The kernel mode drivers control window displays, screen output, and input from devices that the kernel passes to applications. This vulnerability can be exploited when a user opens a specially crafted website, file or opens a file in a working directory that contains a specially crafted DLL file. An attacker could then install programs; view, change, or delete data; or create new accounts with full system rights.
There are no reports of these vulnerabilities being exploited in the wild.
- Windows Server 2003
- Windows Server 2008
- Windows Server 2008 R2
- Windows Server 2012
- Windows Server 2012 R2
- Windows Server Core
- Windows RT
- Windows RT 8.1
- Windows Vista
- Windows 7
- Windows 8
- Windows 8.1
- Large and medium government entities: HIGH
- Small government entities: HIGH
- Large and medium business entities: HIGH
- Small business entities: HIGH
Two vulnerabilities have been privately reported in Microsoft Windows that could allow for remote code execution.
A remote code execution exists in Windows Text Services when it improperly handles objects in memory. This vulnerability may be exploited if an attacker convinces a user to open a specially crafted website or file. (CVE-2015-0081)
A remote code execution exists in Microsoft Windows when DLL files are improperly handled. This vulnerability may be exploited if an attacker convinces a user to open a file in the same directory as a specially crafted DLL file. (CVE-2015-0096)
Successful exploitation could allow an attacker to gain the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
We recommend the following actions be taken:
Apply appropriate patches or workaround provided by Microsoft to vulnerable systems immediately after appropriate testing.
Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
Do not visit untrusted websites or follow links provided by unknown or untrusted sources.
Do not open email attachments from unknown or untrusted sources.
Consider implementing file extension whitelists for allowed e-mail attachments.