ID CVE-2015-2471
Summary Microsoft XML Core Services 3.0, 5.0, and 6.0 supports SSL 2.0, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and conducting a decryption attack, aka "MSXML Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2434.
References
Vulnerable Configurations
  • Microsoft xml_core_services 3.0
    cpe:2.3:a:microsoft:xml_core_services:3.0
  • Microsoft xml_core_services 5.0
    cpe:2.3:a:microsoft:xml_core_services:5.0
  • Microsoft xml_core_services 6.0
    cpe:2.3:a:microsoft:xml_core_services:6.0
CVSS
Base: 4.3 (as of 18-08-2015 - 10:02)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
msbulletin via4
bulletin_id MS15-084
bulletin_url
date 2015-08-11T00:00:00
impact Information Disclosure
knowledgebase_id 3080129
knowledgebase_url
severity Important
title Vulnerabilities in XML Core Services Could Allow Information Disclosure
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS15-084.NASL
description The remote Windows host contains a version of Microsoft XML Core Services (MSXML) that is affected by multiple information disclosure vulnerabilities : - An information disclosure vulnerability exists in XML Core Services (MSXML) due to the use of Secure Sockets Layer (SSL) 2.0. A man-in-the-middle attacker can exploit this vulnerability by forcing an encrypted SSL 2.0 session and then decrypting the resulting network traffic. (CVE-2015-2434, CVE-2015-2471) - An information disclosure vulnerability exists in XML Core Services (MSXML) due to exposing sensitive memory addresses. A remote attacker, using a specially crafted website, can exploit this to bypass ASLR and gain access to private data. (CVE-2015-2440)
last seen 2019-02-21
modified 2018-11-15
plugin id 85335
published 2015-08-11
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=85335
title MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure (3080129)
refmap via4
ms MS15-084
sectrack 1033241
Last major update 23-12-2016 - 21:59
Published 14-08-2015 - 20:59
Last modified 12-10-2018 - 18:09
Back to Top