MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000)

high Nessus Plugin ID 84762

Synopsis

The remote Windows host is affected by multiple remote code execution vulnerabilities.

Description

The remote Windows host is affected by multiple remote code execution vulnerabilities in Hyper-V :

- An error exists in how Hyper-V handles packet size memory initialization in guest virtual machines. An authenticated attacker with access to a guest virtual machine can exploit this by running a specially crafted application to execute arbitrary code in a host context.
(CVE-2015-2361)

- An error exists in how Hyper-V initializes system data structures in guest virtual machines. An authenticated attacker with access to a guest virtual machine can exploit this by running a specially crafted application to execute arbitrary code in a host context.
(CVE-2015-2362)

Solution

Microsoft has released a set of patches for Windows 2008, 2008 R2, 8, 2012, 8.1, and 2012 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-068

Plugin Details

Severity: High

ID: 84762

File Name: smb_nt_ms15-068.nasl

Version: 1.6

Type: local

Agent: windows

Published: 7/15/2015

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 7/14/2015

Vulnerability Publication Date: 7/14/2015

Reference Information

CVE: CVE-2015-2361, CVE-2015-2362

IAVB: 2015-B-0091

MSFT: MS15-068

MSKB: 3046339, 3046359