Vulnerability Name: | CVE-2015-2509 (CCN-106012) | ||||||||
Assigned: | 2015-09-08 | ||||||||
Published: | 2015-09-08 | ||||||||
Updated: | 2019-05-15 | ||||||||
Summary: | Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted Media Center link (mcl) file, aka "Windows Media Center RCE Vulnerability." | ||||||||
CVSS v3 Severity: | 7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-284 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-2509 Source: CCN Type: Microsoft Security Bulletin MS15-100 Vulnerability in Windows Media Center Could Allow Remote Code Execution (3087918) Source: CCN Type: Microsoft Security Bulletin MS15-135 Security Update for Windows Kernel Mode Drivers to Address Elevation of Privilege (3119075) Source: MISC Type: Third Party Advisory http://www.rapid7.com/db/modules/exploit/windows/fileformat/ms15_100_mcl_exe Source: BID Type: Third Party Advisory, VDB Entry 76594 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1033499 Source: MS Type: Patch, Vendor Advisory MS15-100 Source: XF Type: UNKNOWN ms-mediacenter-cve20152509-code-exec(106012) Source: CCN Type: Packet Storm Security [09-15-2015] MS15-100 Microsoft Windows Media Center MCL Code Execution Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [09-11-2015] Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 38151 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [09-15-2015] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 38195 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |