The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Windows: code execution via DLL

Synthesis of the vulnerability

An attacker can invite the victim to open an application from a directory containing a malicious DLL, in order to run code.
Severity of this announce: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 15/07/2015.
Références of this computer vulnerability: 3072631, CERTFR-2015-AVI-298, CVE-2015-2368, CVE-2015-2369, MS15-069, VIGILANCE-VUL-17359, ZDI-15-325.

Description of the vulnerability

Two vulnerabilities were announced in Windows.

An attacker can invite the victim to open an application from a directory containing a malicious DLL, in order to run code. [severity:3/4; CVE-2015-2368, ZDI-15-325]

An attacker can invite the victim to open an RTF document from a directory containing a malicious DLL, in order to run code. [severity:3/4; CVE-2015-2369]

An attacker can therefore invite the victim to open an application from a directory containing a malicious DLL, in order to run code.
Full Vigil@nce bulletin... (Request your free trial)

This vulnerability impacts software or systems such as Windows 2003, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.

Our Vigil@nce team determined that the severity of this security announce is important.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this computer vulnerability note.

Solutions for this threat

Windows: patch for DLL.
A patch is available in information sources.
Full Vigil@nce bulletin... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides computers vulnerabilities alerts. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.