The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Microsoft Windows 2003

cybersecurity note CVE-2017-0176 CVE-2017-8461 CVE-2017-8487

Microsoft Windows XP, 2003: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft Windows XP, 2003.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 15/06/2017.
Identifiers: 4022747, 4024323, 4025218, CERTFR-2017-ALE-008, CERTFR-2017-AVI-181, CVE-2017-0176, CVE-2017-8461, CVE-2017-8487, ESTEEMAUDIT, VIGILANCE-VUL-22983.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Microsoft Windows XP, 2003.

An attacker can use a vulnerability in the proxy for smart card access included in the RDP implementation from Microsoft Windows XP, 2003, in order to run code (VIGILANCE-VUL-22478). [severity:3/4; 4022747, CERTFR-2017-ALE-008, CVE-2017-0176, ESTEEMAUDIT]

An attacker can use a vulnerability via RPC, in order to run code. [severity:2/4; 4024323, CVE-2017-8461]

An attacker can bypass security features via olecnv32.dll, in order to escalate his privileges. [severity:2/4; 4025218, CVE-2017-8487]
Full Vigil@nce bulletin... (Free trial)

security bulletin 22479

Windows 2003: code execution via IIS

Synthesis of the vulnerability

An attacker can use a vulnerability via IIS of Windows 2003, in order to run code.
Severity: 3/4.
Creation date: 18/04/2017.
Identifiers: VIGILANCE-VUL-22479.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use a vulnerability via IIS of Windows 2003, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2017-0176

Windows XP, 2003: code execution via RDP Smart Card Virtual Channel

Synthesis of the vulnerability

An attacker can use a vulnerability via RDP Smart Card Virtual Channel of Windows XP/2003, in order to run code.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 18/04/2017.
Identifiers: 4022747, 4024323, 4025218, CERTFR-2017-ALE-008, CVE-2017-0176, CVE-2017-9073-REJECT, ESTEEMAUDIT, VIGILANCE-VUL-22478.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use a vulnerability via RDP Smart Card Virtual Channel of Windows XP/2003, in order to run code.
Full Vigil@nce bulletin... (Free trial)

weakness announce CVE-2017-0001 CVE-2017-0005 CVE-2017-0007

Windows: vulnerabilities of March 2017

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 82.
Creation date: 14/03/2017.
Revision date: 22/03/2017.
Identifiers: 1019, 1021, 1022, 1023, 1025, 1027, 1028, 1029, 1030, 1031, 1042, 1052, 1053, 1054, 3208223, 4010318, 4010319, 4010320, 4010321, 4013074, 4013075, 4013076, 4013078, 4013081, 4013082, 4013083, 4013389, 993, CERTFR-2017-AVI-082, CERTFR-2017-AVI-154, CVE-2017-0001, CVE-2017-0005, CVE-2017-0007, CVE-2017-0008, CVE-2017-0014, CVE-2017-0016, CVE-2017-0021, CVE-2017-0022, CVE-2017-0023, CVE-2017-0024, CVE-2017-0025, CVE-2017-0026, CVE-2017-0039, CVE-2017-0042, CVE-2017-0043, CVE-2017-0045, CVE-2017-0047, CVE-2017-0050, CVE-2017-0051, CVE-2017-0055, CVE-2017-0056, CVE-2017-0057, CVE-2017-0060, CVE-2017-0061, CVE-2017-0062, CVE-2017-0063, CVE-2017-0072, CVE-2017-0073, CVE-2017-0074, CVE-2017-0075, CVE-2017-0076, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082, CVE-2017-0083, CVE-2017-0084, CVE-2017-0085, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, CVE-2017-0090, CVE-2017-0091, CVE-2017-0092, CVE-2017-0095, CVE-2017-0096, CVE-2017-0097, CVE-2017-0098, CVE-2017-0099, CVE-2017-0100, CVE-2017-0101, CVE-2017-0102, CVE-2017-0103, CVE-2017-0104, CVE-2017-0108, CVE-2017-0109, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, CVE-2017-0128, CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, CVE-2017-0148, MS17-008, MS17-009, MS17-010, MS17-011, MS17-012, MS17-013, MS17-016, MS17-017, MS17-018, MS17-019, MS17-020, MS17-021, MS17-022, VIGILANCE-VUL-22132, ZDI-17-168.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2014-0282 CVE-2014-1762 CVE-2014-1764

Internet Explorer: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Internet Explorer.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 4.
Creation date: 10/06/2014.
Revision date: 20/12/2016.
Identifiers: 2969262, CERTFR-2014-AVI-266, CVE-2014-0282, CVE-2014-1762, CVE-2014-1764, CVE-2014-1766, CVE-2014-1769, CVE-2014-1771, CVE-2014-1772, CVE-2014-1773, CVE-2014-1774, CVE-2014-1775, CVE-2014-1777, CVE-2014-1778, CVE-2014-1779, CVE-2014-1780, CVE-2014-1781, CVE-2014-1782, CVE-2014-1783, CVE-2014-1784, CVE-2014-1785, CVE-2014-1786, CVE-2014-1788, CVE-2014-1789, CVE-2014-1790, CVE-2014-1791, CVE-2014-1792, CVE-2014-1794, CVE-2014-1795, CVE-2014-1796, CVE-2014-1797, CVE-2014-1799, CVE-2014-1800, CVE-2014-1802, CVE-2014-1803, CVE-2014-1804, CVE-2014-1805, CVE-2014-2753, CVE-2014-2754, CVE-2014-2755, CVE-2014-2756, CVE-2014-2757, CVE-2014-2758, CVE-2014-2759, CVE-2014-2760, CVE-2014-2761, CVE-2014-2763, CVE-2014-2764, CVE-2014-2765, CVE-2014-2766, CVE-2014-2767, CVE-2014-2768, CVE-2014-2769, CVE-2014-2770, CVE-2014-2771, CVE-2014-2772, CVE-2014-2773, CVE-2014-2775, CVE-2014-2776, CVE-2014-2777, CVE-2014-2782, MS14-035, VIGILANCE-VUL-14876, ZDI-14-174, ZDI-14-175, ZDI-14-176, ZDI-14-177, ZDI-14-178, ZDI-14-179, ZDI-14-180, ZDI-14-181, ZDI-14-182, ZDI-14-183, ZDI-14-184, ZDI-14-185, ZDI-14-186, ZDI-14-212, ZDI-14-213, ZDI-14-226, ZDI-14-227, ZDI-14-237, ZDI-14-259, ZDI-14-260, ZDI-14-270, ZDI-14-354, ZDI-14-357, ZDI-14-366, ZDI-14-367.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Internet Explorer.

An attacker can use a TLS Certificate Renegotiation, in order to obtain sensitive information. [severity:2/4; CVE-2014-1771]

An attacker can read local files, in order to obtain sensitive information. [severity:2/4; CVE-2014-1777]

An attacker can use three vulnerabilities, in order to escalate his privileges. [severity:2/4; CVE-2014-1764, CVE-2014-1778, CVE-2014-2777]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2014-0282, CVE-2014-1762, CVE-2014-1766, CVE-2014-1769, CVE-2014-1772, CVE-2014-1773, CVE-2014-1774, CVE-2014-1775, CVE-2014-1779, CVE-2014-1780, CVE-2014-1781, CVE-2014-1782, CVE-2014-1783, CVE-2014-1784, CVE-2014-1785, CVE-2014-1786, CVE-2014-1788, CVE-2014-1789, CVE-2014-1790, CVE-2014-1791, CVE-2014-1792, CVE-2014-1794, CVE-2014-1795, CVE-2014-1796, CVE-2014-1797, CVE-2014-1799, CVE-2014-1800, CVE-2014-1802, CVE-2014-1803, CVE-2014-1804, CVE-2014-1805, CVE-2014-2753, CVE-2014-2754, CVE-2014-2755, CVE-2014-2756, CVE-2014-2757, CVE-2014-2758, CVE-2014-2759, CVE-2014-2760, CVE-2014-2761, CVE-2014-2763, CVE-2014-2764, CVE-2014-2765, CVE-2014-2766, CVE-2014-2767, CVE-2014-2768, CVE-2014-2769, CVE-2014-2770, CVE-2014-2771, CVE-2014-2772, CVE-2014-2773, CVE-2014-2775, CVE-2014-2776, CVE-2014-2782, ZDI-14-174, ZDI-14-175, ZDI-14-176, ZDI-14-177, ZDI-14-178, ZDI-14-179, ZDI-14-180, ZDI-14-181, ZDI-14-182, ZDI-14-183, ZDI-14-184, ZDI-14-185, ZDI-14-186, ZDI-14-212, ZDI-14-213, ZDI-14-226, ZDI-14-227, ZDI-14-237, ZDI-14-259, ZDI-14-260, ZDI-14-270, ZDI-14-354, ZDI-14-357, ZDI-14-366, ZDI-14-367]
Full Vigil@nce bulletin... (Free trial)

computer weakness bulletin CVE-2014-1767

Windows: privilege elevation via AFD

Synthesis of the vulnerability

A local attacker can create an error in Ancillary Function Driver in order to execute code with system privileges.
Severity: 2/4.
Creation date: 08/07/2014.
Revision date: 16/02/2016.
Identifiers: 2975684, CERTFR-2014-AVI-303, CVE-2014-1767, MS14-040, VIGILANCE-VUL-15009, ZDI-14-220.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The afd.sys (Ancillary Function Driver) driver is used to access to Winsock network features. The TDI (Transport Driver Interface) interface is used to communicate with AFD.

However, TDI does not correctly check User Mode parameters given to the kernel.

A local attacker can therefore create an error in Ancillary Function Driver in order to execute code with system privileges.
Full Vigil@nce bulletin... (Free trial)

threat CVE-2015-2387

Windows: memory corruption via ATM Font Driver

Synthesis of the vulnerability

A local attacker can generate a memory corruption in ATMFD.DLL of Windows, in order to trigger a denial of service, and possibly to run code.
Severity: 2/4.
Creation date: 15/07/2015.
Identifiers: 3077657, CERTFR-2015-AVI-290, CVE-2015-2387, MS15-077, VIGILANCE-VUL-17368, VU#103336.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The ATMFD.DLL (Adobe Type Manager Font Driver) library is installed on the system to manage character fonts.

However, a local application using a malicious font corrupts the ATMFD.DLL memory.

A local attacker can therefore generate a memory corruption in ATMFD.DLL of Windows, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

weakness alert CVE-2015-2370

Windows: privilege escalation via RPC

Synthesis of the vulnerability

A local attacker can bypass the authentication via RPC of Windows, in order to escalate his privileges.
Severity: 2/4.
Creation date: 15/07/2015.
Identifiers: 3067505, CERTFR-2015-AVI-291, CVE-2015-2370, MS15-076, VIGILANCE-VUL-17367.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The RPC (Remote Procedure Call) feature allows a process to query another process.

However, an attacker can use a DCE/RPC connection reflection, to bypass the authentication.

A local attacker can therefore bypass the authentication via RPC of Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer threat bulletin CVE-2015-2416 CVE-2015-2417

Windows: two vulnerabilities of OLE

Synthesis of the vulnerability

An attacker can use several vulnerabilities of OLE of Windows.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 15/07/2015.
Identifiers: 3072633, CERTFR-2015-AVI-292, CVE-2015-2416, CVE-2015-2417, MS15-075, VIGILANCE-VUL-17366.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can bypass security features, in order to escalate his privileges by using another vulnerability. [severity:2/4; CVE-2015-2416]

An attacker can bypass security features, in order to escalate his privileges by using another vulnerability. [severity:2/4; CVE-2015-2417]
Full Vigil@nce bulletin... (Free trial)

computer threat note CVE-2015-2371

Windows: privilege escalation via MSI

Synthesis of the vulnerability

A local attacker can create a Trojan Horse for the Windows Installer, in order to escalate his privileges.
Severity: 2/4.
Creation date: 15/07/2015.
Identifiers: 3072630, CERTFR-2015-AVI-293, CVE-2015-2371, MS15-074, VIGILANCE-VUL-17364, ZDI-15-339.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Windows Installer is called to install software on the system from a MSI file.

When a software was installed, the Windows Installer can execute new scripts it finds on the system. These scripts are run with the privilege of the next user.

A local attacker can therefore create a Trojan Horse for the Windows Installer, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.