Vulnerabilities > CVE-2015-0032 - Resource Management Errors vulnerability in Microsoft Internet Explorer and Vbscript
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 8 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS15-019 |
bulletin_url | |
date | 2015-03-10T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 3040297 |
knowledgebase_url | |
severity | Critical |
title | Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution |
Nessus
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS15-018.NASL description The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3032359. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities. An attacker can exploit these by convincing a user to visit a specially crafted website. last seen 2020-06-01 modified 2020-06-02 plugin id 81733 published 2015-03-10 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/81733 title MS15-018: Cumulative Security Update for Internet Explorer (3032359) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(81733); script_version("1.9"); script_cvs_date("Date: 2018/11/15 20:50:31"); script_cve_id( "CVE-2015-0032", "CVE-2015-0056", "CVE-2015-0072", "CVE-2015-0099", "CVE-2015-0100", "CVE-2015-1622", "CVE-2015-1623", "CVE-2015-1624", "CVE-2015-1625", "CVE-2015-1626", "CVE-2015-1627", "CVE-2015-1634" ); script_bugtraq_id( 72489, 72910, 72923, 72924, 72925, 72926, 72927, 72928, 72929, 72930, 72931, 72932 ); script_xref(name:"MSFT", value:"MS15-018"); script_xref(name:"MSKB", value:"3032359"); script_name(english:"MS15-018: Cumulative Security Update for Internet Explorer (3032359)"); script_summary(english:"Checks the version of Mshtml.dll."); script_set_attribute(attribute:"synopsis", value: "The remote host has a web browser installed that is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3032359. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities. An attacker can exploit these by convincing a user to visit a specially crafted website."); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-018"); script_set_attribute(attribute:"solution", value: "Microsoft has released a set of patches for Internet Explorer 6, 7, 8, 9, 10, and 11."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/02/01"); # CVE-2015-0072 script_set_attribute(attribute:"patch_publication_date", value:"2015/03/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/10"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:ie"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows : Microsoft Bulletins"); script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc."); script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl"); script_require_keys("SMB/MS_Bulletin_Checks/Possible"); script_require_ports(139, 445, "Host/patch_management_checks"); exit(0); } include("audit.inc"); include("smb_hotfixes_fcheck.inc"); include("smb_hotfixes.inc"); include("smb_func.inc"); include("misc_func.inc"); get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible"); bulletin = 'MS15-018'; kb = '3032359'; kbs = make_list(kb); if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE); get_kb_item_or_exit("SMB/Registry/Enumerated"); get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1); productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1); # Some of the 2k3 checks could flag XP 64, which is unsupported if ("Windows XP" >< productname) audit(AUDIT_OS_SP_NOT_VULN); if (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN); if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE); share = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE); if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share); ie_ver = get_kb_item("SMB/IE/Version"); vuln = 0; if ( # Windows 8.1 / 2012 R2 # # - Internet Explorer 11 with KB2919355 applied hotfix_is_vulnerable(os:"6.3", file:"Mshtml.dll", version:"11.0.9600.17690", min_version:"11.0.9600.16000", dir:"\system32", bulletin:bulletin, kb:kb) || # Windows 8 / 2012 # # - Internet Explorer 10 hotfix_is_vulnerable(os:"6.2", file:"Mshtml.dll", version:"10.0.9200.21384", min_version:"10.0.9200.21000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.2", file:"Mshtml.dll", version:"10.0.9200.17267", min_version:"10.0.9200.16000", dir:"\system32", bulletin:bulletin, kb:kb) || # Windows 7 / 2008 R2 # - Internet Explorer 11 with KB2929437 applied hotfix_is_vulnerable(os:"6.1", sp:1, file:"Mshtml.dll", version:"11.0.9600.17690", min_version:"11.0.9600.17000", dir:"\system32", bulletin:bulletin, kb:kb) || # - Internet Explorer 10 hotfix_is_vulnerable(os:"6.1", sp:1, file:"Mshtml.dll", version:"10.0.9200.21384", min_version:"10.0.9200.21000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.1", sp:1, file:"Mshtml.dll", version:"10.0.9200.17267", min_version:"10.0.9200.16000", dir:"\system32", bulletin:bulletin, kb:kb) || # - Internet Explorer 9 hotfix_is_vulnerable(os:"6.1", sp:1, file:"Mshtml.dll", version:"9.0.8112.20747", min_version:"9.0.8112.20000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.1", sp:1, file:"Mshtml.dll", version:"9.0.8112.16633", min_version:"9.0.8112.16000", dir:"\system32", bulletin:bulletin, kb:kb) || # - Internet Explorer 8 hotfix_is_vulnerable(os:"6.1", sp:1, file:"Mshtml.dll", version:"8.0.7601.22958", min_version:"8.0.7601.22000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.1", sp:1, file:"Mshtml.dll", version:"8.0.7601.18751", min_version:"8.0.7601.17000", dir:"\system32", bulletin:bulletin, kb:kb) || # Vista / 2008 # # - Internet Explorer 9 hotfix_is_vulnerable(os:"6.0", sp:2, file:"Mshtml.dll", version:"9.0.8112.20747", min_version:"9.0.8112.20000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.0", sp:2, file:"Mshtml.dll", version:"9.0.8112.16633", min_version:"9.0.8112.16000", dir:"\system32", bulletin:bulletin, kb:kb) || # - Internet Explorer 8 hotfix_is_vulnerable(os:"6.0", sp:2, file:"Mshtml.dll", version:"8.0.6001.23661", min_version:"8.0.6001.23000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.0", sp:2, file:"Mshtml.dll", version:"8.0.6001.19607", min_version:"8.0.6001.18000", dir:"\system32", bulletin:bulletin, kb:kb) || # - Internet Explorer 7 hotfix_is_vulnerable(os:"6.0", sp:2, file:"Mshtml.dll", version:"7.0.6002.23620", min_version:"7.0.6002.23000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.0", sp:2, file:"Mshtml.dll", version:"7.0.6002.19310", min_version:"7.0.6002.18000", dir:"\system32", bulletin:bulletin, kb:kb) || # Windows 2003 # # - Internet Explorer 8 hotfix_is_vulnerable(os:"5.2", sp:2, file:"Mshtml.dll", version:"8.0.6001.23661", min_version:"8.0.0.0", dir:"\system32", bulletin:bulletin, kb:kb) || # - Internet Explorer 7 hotfix_is_vulnerable(os:"5.2", sp:2, file:"Mshtml.dll", version:"7.0.6000.21443", min_version:"7.0.0.0", dir:"\system32", bulletin:bulletin, kb:kb) || # - Internet Explorer 6 hotfix_is_vulnerable(os:"5.2", sp:2, file:"Mshtml.dll", version:"6.0.3790.5543", min_version:"6.0.0.0", dir:"\system32", bulletin:bulletin, kb:kb) ) vuln++; if( vuln ) { set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE); hotfix_security_hole(); hotfix_check_fversion_end(); exit(0); } else { hotfix_check_fversion_end(); audit(AUDIT_HOST_NOT, 'affected'); }
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS15-019.NASL description The VBScript scripting engine installed on the remote Windows host is affected by a remote code execution vulnerability due to improper handling of objects in memory. A remote attacker can exploit this issue by convincing a user to visit a specially crafted website or open a specially crafted Microsoft Office document, resulting in the execution of arbitrary code in the context of the current user. last seen 2020-06-01 modified 2020-06-02 plugin id 81734 published 2015-03-10 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/81734 title MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3040297) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(81734); script_version("1.13"); script_cvs_date("Date: 2018/11/15 20:50:31"); script_cve_id("CVE-2015-0032"); script_bugtraq_id(72910); script_xref(name:"MSFT", value:"MS15-019"); script_xref(name:"MSKB", value:"3030403"); script_xref(name:"MSKB", value:"3030398"); script_xref(name:"MSKB", value:"3030630"); script_name(english:"MS15-019: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3040297)"); script_summary(english:"Checks the version of Vbscript.dll."); script_set_attribute(attribute:"synopsis", value: "The remote Windows host is affected by a remote code execution vulnerability."); script_set_attribute(attribute:"description", value: "The VBScript scripting engine installed on the remote Windows host is affected by a remote code execution vulnerability due to improper handling of objects in memory. A remote attacker can exploit this issue by convincing a user to visit a specially crafted website or open a specially crafted Microsoft Office document, resulting in the execution of arbitrary code in the context of the current user."); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-019"); script_set_attribute(attribute:"solution", value: "Microsoft has released a set of patches for Windows 2003, Vista, 2008, and 2008 R2."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/03/10"); script_set_attribute(attribute:"patch_publication_date", value:"2015/03/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/10"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows : Microsoft Bulletins"); script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc."); script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl"); script_require_keys("SMB/MS_Bulletin_Checks/Possible"); script_require_ports(139, 445, 'Host/patch_management_checks'); exit(0); } include("audit.inc"); include("smb_hotfixes_fcheck.inc"); include("smb_hotfixes.inc"); include("smb_func.inc"); include("misc_func.inc"); get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible"); bulletin = 'MS15-019'; kbs = make_list( "3030403", "3030398", "3030630" ); if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE); get_kb_item_or_exit("SMB/Registry/Enumerated"); get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1); if (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN); # nb: Microsoft regards this a defense-in-depth update for Server Core so # we won't flag it on that if report_paranoia < 2. if (report_paranoia < 2 && hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE); # if IE isn't installed we must still check the vbscript version ie_ver = get_kb_item("SMB/IE/Version"); productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1); # Some of the 2k3 checks could flag XP 64, which is unsupported if ("Windows XP" >< productname) audit(AUDIT_OS_SP_NOT_VULN); rootfile = hotfix_get_systemroot(); if (!rootfile) exit(1, "Failed to get the system root."); share = hotfix_path2share(path:rootfile); if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share); vuln = 0; # VBScript 5.8 kb = "3030630"; # - with IE 8 if ( !isnull(ie_ver) && ie_ver =~ "^8\." && hotfix_check_server_core() == 1 && ( # Windows Server 2008 R2 hotfix_is_vulnerable(os:"6.1", sp:1, file:"Vbscript.dll", version:"5.8.7601.22966", min_version:"5.8.7601.22000", dir:"\system32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.1", sp:1, file:"Vbscript.dll", version:"5.8.7601.18759", min_version:"5.8.7601.0", dir:"\system32", bulletin:bulletin, kb:kb) ) ) vuln++; # VBScript 5.7 kb = "3030398"; if ( # ie_ver < IE8 (isnull(ie_ver) || (ver_compare(ver:ie_ver, fix:"8.0.0.0") < 0)) && ( # Vista / Windows 2008 hotfix_is_vulnerable(os:"6.0", sp:2, file:"Vbscript.dll", version:"5.7.6002.23629", min_version:"5.7.6002.22000", dir:"\System32", bulletin:bulletin, kb:kb) || hotfix_is_vulnerable(os:"6.0", sp:2, file:"Vbscript.dll", version:"5.7.6002.19319", min_version:"5.7.6002.0", dir:"\System32", bulletin:bulletin, kb:kb) || # Windows 2003 hotfix_is_vulnerable(os:"5.2", sp:2, file:"Vbscript.dll", version:"5.7.6002.23629", min_version:"5.7.0.0", dir:"\system32", bulletin:bulletin, kb:kb) ) ) vuln++; # VBScript 5.6 kb = "3030403"; if ( # ie_ver < IE8 (isnull(ie_ver) || (ver_compare(ver:ie_ver, fix:"8.0.0.0") < 0)) && ( # Windows 2003 hotfix_is_vulnerable(os:"5.2", sp:2, file:"Vbscript.dll", version:"5.6.0.8854", min_version:"5.6.0.0", dir:"\system32", bulletin:bulletin, kb:kb) ) ) vuln++; if (vuln) { set_kb_item(name:"SMB/Missing/"+bulletin, value:TRUE); hotfix_security_hole(); hotfix_check_fversion_end(); exit(0); } else { hotfix_check_fversion_end(); audit(AUDIT_HOST_NOT, 'affected'); }
References
- http://www.securityfocus.com/bid/72910
- http://www.securityfocus.com/bid/72910
- http://www.securitytracker.com/id/1031887
- http://www.securitytracker.com/id/1031887
- http://www.securitytracker.com/id/1031888
- http://www.securitytracker.com/id/1031888
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-019
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-019