Zscaler, working with Microsoft through their MAPP program, has proactively deployed protections for the following 12 vulnerabilities included in the August 2015 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections as necessary.
MS15-080 - Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution
Severity: Critical
Affected Software
CVE-2015-2431 - Microsoft Office Graphics Component Remote Code Execution Vulnerability
Description: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts.
MS15-081 - Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
Severity: Critical
Affected Software
CVE-2015-2477 - Microsoft Office Memory Corruption Vulnerability
CVE-2015-2470 - Microsoft Office Integer Underflow Vulnerability
Description: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
MS15-079 - Cumulative Security Update for Internet Explorer
Severity: Critical
Affected Software
CVE-2015-2444 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2443 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2452 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2451 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2450 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2448 - Memory Corruption Vulnerability in Internet Explorer
Description: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
MS15-090 – Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege
Severity: Important
Affected Software
CVE-2015-2429 –Windows Registry Elevation of Privilege Vulnerability
Description: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox.
MS15-091 – Cumulative Security Update for Microsoft Edge
Severity: Critical
Affected Software
CVE-2015-2442 – Memory Corruption Vulnerability
CVE-2015-2446 – Memory Corruption Vulnerability
Description: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.