CVE-2015-0008
The UNC implementation in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not include authentication from the server to the client, which allows remote attackers to execute arbitrary code by making crafted data available on a UNC share, as demonstrated by Group Policy data from a spoofed domain controller, aka "Group Policy Remote Code Execution Vulnerability."
Published
2015-02-11T03:00:29.607
Last Modified
2025-04-12T10:46:40.837
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 8.3 (HIGH)
CVSSv2 Vector
AV:A/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: ADJACENT_NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
6.5
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx
Patch, Vendor Advisory
([email protected])
-
http://packetstormsecurity.com/files/155002/Microsoft-Windows-Server-2012-Group-Policy-Remote-Code-Execution.html
([email protected])
-
http://www.kb.cert.org/vuls/id/787252
Third Party Advisory, US Government Resource
([email protected])
-
http://www.securityfocus.com/bid/72477
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1031719
Third Party Advisory, VDB Entry
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-011
Patch, Vendor Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/100426
Third Party Advisory, VDB Entry
([email protected])
-
https://www.jasadvisors.com/additonal-jasbug-security-exploit-info/
Third Party Advisory
([email protected])
-
http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.com/files/155002/Microsoft-Windows-Server-2012-Group-Policy-Remote-Code-Execution.html
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/787252
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/72477
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1031719
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-011
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/100426
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.jasadvisors.com/additonal-jasbug-security-exploit-info/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)