CVE-2015-2482 – Microsoft Windows JavaScript Regular Expression Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2482
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted replace operation with a JavaScript regular expression, aka "Scripting Engine Memory Corruption Vulnerability." Los motores Microsoft (1) VBScript 5.7 y 5.8 y (2) JScript 5.7 y 5.8, tal como se utiliza en Internet Explorer 8 hasta la versión 11 y otros productos, permiten a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una operación de sustitución manipulada con una expresión regular JavaScript, también conocido como 'Scripting Engine Memory Corruption Vulnerability'. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to search and replace operations performed using JavaScript regular expressions. An attacker can cause the in-memory representation of a regular expression to be freed while it is being used in a replace operation. • https://www.exploit-db.com/exploits/40798 http://seclists.org/fulldisclosure/2015/Oct/54 http://www.securitytracker.com/id/1033800 http://www.zerodayinitiative.com/advisories/ZDI-15-515 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-108 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2372
https://notcve.org/view.php?id=CVE-2015-2372
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." vbscript.dll en Microsoft VBScript versión 5.6 a la 5.8, tal como se utiliza con Internet Explorer versión 6 a la 11 y otros productos, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicios mediante la corrupción de memoria a través de un sitio web específicamente diseñado para este fin, error conocido como 'VBScript Memory Corruption Vulnerability.' • http://www.securitytracker.com/id/1032894 http://www.securitytracker.com/id/1032895 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-066 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-1686
https://notcve.org/view.php?id=CVE-2015-1686
The Microsoft (1) VBScript 5.6 through 5.8 and (2) JScript 5.6 through 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript ASLR Bypass." Los motores Microsoft (1) VBScript 5.6 hasta 5.8 y (2) JScript 5.6 hasta 5.8, utilizados en Internet Explorer 8 hasta 11 y otros productos, permiten a atacantes remotos evadir el mecanismo de protección ASLR a través de un sitio web manipulado, también conocido como 'evasión de ASLR de VBScript y JScript.' • http://www.securityfocus.com/bid/74530 http://www.securitytracker.com/id/1032282 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-1684 – Microsoft Windows VBScript Regular Expression Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2015-1684
VBScript.dll in the Microsoft VBScript 5.6 through 5.8 engine, as used in Internet Explorer 8 through 11 and other products, allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript ASLR Bypass." VBScript.dll en el motor Microsoft VBScript 5.6 hasta 5.8, utilizado en Internet Explorer 8 hasta 11 y otros productos, permite a atacantes remotos evadir el mecanismo de protección ASLR a través de un sitio web manipulado, también conocido como 'evasión de ASLR de VBScript.' This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how VBScript processes capturing groups in regular expressions. By performing a search using a regular expression that has an unusual form, an attacker can reveal data stored in the memory of the current process. • http://www.securityfocus.com/bid/74522 http://www.securitytracker.com/id/1032282 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-0032
https://notcve.org/view.php?id=CVE-2015-0032
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 8 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." vbscript.dll en Microsoft VBScript 5.6 hasta 5.8, utilizado con Internet Explorer 8 hasta 11 y otros productos, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de corrupción de memoria de VBScript.' • http://www.securityfocus.com/bid/72910 http://www.securitytracker.com/id/1031887 http://www.securitytracker.com/id/1031888 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-019 • CWE-399: Resource Management Errors •