CVE-2015-2507 – Microsoft Windows Kernel - Use-After-Free with Printer Device Contexts (MS15-097)
https://notcve.org/view.php?id=CVE-2015-2507
The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Font Driver Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2512. Vulnerabilidad en Adobe Type Manager Library en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Font Driver Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2512. The Microsoft Windows kernel suffers from a use-after-free vulnerability in printer device contexts. • https://www.exploit-db.com/exploits/38279 http://www.securityfocus.com/bid/76591 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-2518 – Microsoft Windows Kernel - 'bGetRealizedBrush' Use-After-Free (MS15-097)
https://notcve.org/view.php?id=CVE-2015-2518
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2546. Vulnerabilidad en el controlador kernel-mode en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Win32k Memory Corruption Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2511, CVE-2015-2517 y CVE-2015-2546. The Microsoft Windows kernel suffers from a use-after-free vulnerability in BGetRealizedBrush. • https://www.exploit-db.com/exploits/38277 http://www.securityfocus.com/bid/76607 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-2517 – Microsoft Windows Kernel - Use-After-Free with Cursor Object (MS15-097)
https://notcve.org/view.php?id=CVE-2015-2517
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2518, and CVE-2015-2546. Vulnerabilidad en el controlador kernel-mode en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Win32k Memory Corruption Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2511, CVE-2015-2518 y CVE-2015-2546. The Microsoft Windows kernel suffers from a use-after-free vulnerability in the cursor object. • https://www.exploit-db.com/exploits/38278 http://www.securityfocus.com/bid/76606 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-2512 – Microsoft Windows Kernel - 'NtGdiBitBlt' Buffer Overflow (MS15-097)
https://notcve.org/view.php?id=CVE-2015-2512
The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Font Driver Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2507. Vulnerabilidad en Adobe Type Manager Library en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Font Driver Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2507. The Microsoft Windows kernel suffers from a pool buffer overflow in NtGdiStretchBlt. • https://www.exploit-db.com/exploits/38307 https://www.exploit-db.com/exploits/38280 http://www.securityfocus.com/bid/76589 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-2529
https://notcve.org/view.php?id=CVE-2015-2529
The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 allows local users to bypass the ASLR protection mechanism via a crafted application, aka "Kernel ASLR Bypass Vulnerability." Vulnerabilidad en el kernel en Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 y Windows 10, permite a usuarios locales eludir el mecanismo de protección ASLR a través de una aplicación manipulada, también conocida como 'Kernel ASLR Bypass Vulnerability.' • http://www.securityfocus.com/bid/76602 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-254: 7PK - Security Features •