CVE-2015-2502

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:27

Type Values Removed Values Added
References () http://twitter.com/Laughing_Mantis/statuses/633839231840841728 - Exploit () http://twitter.com/Laughing_Mantis/statuses/633839231840841728 - Exploit
References () http://twitter.com/Laughing_Mantis/statuses/633839771865886721 - Broken Link () http://twitter.com/Laughing_Mantis/statuses/633839771865886721 - Broken Link
References () http://www.securityfocus.com/bid/76403 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/76403 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1033317 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1033317 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild - Press/Media Coverage () http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild - Press/Media Coverage
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-093 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-093 - Patch, Vendor Advisory

02 Jul 2024, 17:42

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 8.8
First Time Microsoft windows Server 2012
Microsoft windows 10 1507
Microsoft windows Vista
Microsoft windows Server 2008
Microsoft windows 8
Microsoft windows Rt 8.1
Microsoft windows 7
Microsoft windows 8.1
CPE cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
CWE CWE-119 CWE-787
References () http://twitter.com/Laughing_Mantis/statuses/633839231840841728 - () http://twitter.com/Laughing_Mantis/statuses/633839231840841728 - Exploit
References () http://twitter.com/Laughing_Mantis/statuses/633839771865886721 - () http://twitter.com/Laughing_Mantis/statuses/633839771865886721 - Broken Link
References () http://www.securityfocus.com/bid/76403 - () http://www.securityfocus.com/bid/76403 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1033317 - () http://www.securitytracker.com/id/1033317 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild - () http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild - Press/Media Coverage
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-093 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-093 - Patch, Vendor Advisory

Information

Published : 2015-08-19 10:59

Updated : 2024-11-21 02:27


NVD link : CVE-2015-2502

Mitre link : CVE-2015-2502

CVE.ORG link : CVE-2015-2502


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_10_1507
  • windows_7
  • windows_8.1
  • windows_rt_8.1
  • windows_server_2012
  • windows_server_2008
  • internet_explorer
  • windows_8
CWE
CWE-787

Out-of-bounds Write