The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Windows, Office, Lync: multiple vulnerabilities of Graphics Component

Synthesis of the vulnerability 

Several vulnerabilities were announced in Windows, Office, and Lync.
Impacted systems: Lync, Office, Access, Office Communicator, Excel, OneNote, Outlook, PowerPoint, Project, Publisher, Visio, Word, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity of this alert: 4/4.
Number of vulnerabilities in this bulletin: 12.
Creation date: 08/09/2015.
Références of this alert: 3089656, CERTFR-2015-AVI-380, CVE-2015-2506, CVE-2015-2507, CVE-2015-2508, CVE-2015-2510, CVE-2015-2511, CVE-2015-2512, CVE-2015-2517, CVE-2015-2518, CVE-2015-2527, CVE-2015-2529, CVE-2015-2546, CVE-2018-7249, CVE-2018-7250, MS15-097, VIGILANCE-VUL-17843, ZDI-15-457.

Description of the vulnerability 

Several vulnerabilities were announced in Windows, Office, and Lync.

An attacker can generate a memory corruption in OpenType Font, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-2506]

An attacker can bypass security features in Windows Adobe Type Manager Library, in order to escalate his privileges. [severity:2/4; CVE-2015-2507]

An attacker can bypass security features in Windows Adobe Type Manager Library, in order to escalate his privileges. [severity:2/4; CVE-2015-2508]

An attacker can bypass security features in Windows Adobe Type Manager Library, in order to escalate his privileges. [severity:2/4; CVE-2015-2512]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-2510]

An attacker can generate a memory corruption in Win32k, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-2511]

An attacker can generate a memory corruption in Win32k, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-2517]

An attacker can generate a memory corruption in Win32k, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-2518]

An attacker can generate a memory corruption in Win32k, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-2546]

An attacker can bypass security features in Win32k, in order to escalate his privileges. [severity:2/4; CVE-2015-2527]

An attacker can guess the memory layout of a process, to bypass ASLR, in order to ease the next step of the attack. [severity:1/4; CVE-2015-2529]

An attacker can bypass security features in secdrv.sys, in order to escalate his privileges. [severity:2/4; ZDI-15-457]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability impacts software or systems such as Lync, Office, Access, Office Communicator, Excel, OneNote, Outlook, PowerPoint, Project, Publisher, Visio, Word, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.

Our Vigil@nce team determined that the severity of this security announce is critical.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 12 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a beginner ability can exploit this computer vulnerability note.

Solutions for this threat 

Windows, Office, Lync: patch for Graphics Component.
A patch is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides software vulnerabilities patches. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.