Oval Definition:oval:org.mitre.oval:def:28717
Revision Date:2015-02-23Version:45
Title:Directory Traversal elevation of privilege vulnerability - CVE-2015-0016 (MS15-004)
Description:Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."
Family:windowsClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2015-0016
Platform(s):Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Vista
Product(s):Microsoft Windows Remote Desktop Connection 7.0
Microsoft Windows Remote Desktop Connection 8.0
Microsoft Windows Remote Desktop Connection 8.1
Definition Synopsis
  • Vista / Remote Desktop 7.0 / vulnerable file version
  • Vista / 2K8
  • Microsoft Windows Vista (32-bit) is installed
  • OR Microsoft Windows Vista x64 Edition is installed
  • AND Check for vulnerable version
  • Remote Desktop 7.0 and Check for LDR
  • Check if the version of Tswbprxy.exe is less than 6.1.7600.17715
  • AND Check if the version of Tswbprxy.exe is greater than or equal to 6.1.7600.00000
  • OR Check for LDR
  • Check if the version of Tswbprxy.exe is greater than or equal to 6.1.7600.21000
  • AND Check if the version of Tswbprxy.exe is less than 6.1.7600.21909
  • OR Win 7 / R2 + vulnerable file version
  • Win 7 / R2
  • Microsoft Windows 7 (32-bit) is installed
  • OR Microsoft Windows 7 x64 Edition is installed
  • OR Microsoft Windows Server 2008 R2 x64 Edition is installed
  • AND Check for vulnerable version
  • Check if the version of Tswbprxy.exe is less than 6.1.7601.18699
  • OR Check for LDR
  • Check if the version of Tswbprxy.exe is greater than or equal to 6.1.7601.22000
  • AND Check if the version of Tswbprxy.exe is less than 6.1.7601.22907
  • OR Remote Desktop 8.0 and vulnerable version
  • Check if the version of Tswbprxy.exe is less than 6.2.9200.17212
  • AND Check if the version of Tswbprxy.exe is greater than or equal to 6.2.9200.00000
  • OR Remote Desktop 8.0 and Check for LDR
  • Check if the version of Tswbprxy.exe is greater than or equal to 6.2.9200.21000
  • AND Check if the version of Tswbprxy.exe is less than 6.2.9200.21329
  • OR Remote Desktop 8.1 and vulnerable version
  • Check if the version of Tswbprxy.exe is less than 6.3.9600.17553
  • AND Check if the version of Tswbprxy.exe is greater than or equal to 6.3.9600.00000
  • OR 2008 R2 IA64 + vulnerable file version
  • Microsoft Windows Server 2008 R2 Itanium-Based Edition is installed
  • AND Check for vulnerable version
  • Check if the version of Tswbprxy.exe is less than 6.1.7601.18699
  • OR Check for LDR
  • Check if the version of Tswbprxy.exe is greater than or equal to 6.1.7601.22000
  • AND Check if the version of Tswbprxy.exe is less than 6.1.7601.22907
  • OR Win 8/2k12 and vulnerable file version
  • Win 8 / 2k12
  • Microsoft Windows 8 (x86) is installed
  • OR Microsoft Windows 8 (x64) is installed
  • OR Microsoft Windows Server 2012 (64-bit) is installed
  • AND Check for vulnerable version
  • Check if the version of Tswbprxy.exe is less than 6.2.9200.17213
  • OR Check for LDR
  • Check if the version of Tswbprxy.exe is greater than or equal to 6.2.9200.21000
  • AND Check if the version of Tswbprxy.exe is less than 6.2.9200.21329
  • OR Win 8.1 / 2K12 R2and vulnerable file version
  • Win 8.1 / 2k12 R2
  • Microsoft Windows 8.1 (x86) is installed
  • OR Microsoft Windows 8.1 (x64) is installed
  • OR Microsoft Windows Server 2012 R2 is installed
  • AND Check if the version of Tswbprxy.exe is less than 6.3.9600.17555
  • BACK