Microsoft JScript and VBScript Cumulative Security Update
Last Update Date:
9 Dec 2015 13:54
Release Date:
9 Dec 2015
3765
Views
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
- Scripting Engine Information Disclosure Vulnerability
An information disclosure vulnerability exists when VBScript improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user’s computer or data. - Scripting Engine Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way that the VBScript engine renders, when handling objects in memory in Internet Explorer. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites, and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.
Impact
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- JScript 5.7 and VBScript 5.7
- JScript 5.8 and VBScript 5.8
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
https://technet.microsoft.com/en-us/library/security/MS15-126
Vulnerability Identifier
Source
Related Link
Share with