Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.2801 Microsoft Security Bulletin MS15-120: Security Update for IPSec to Address Denial of Service (3102939) 11 November 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Windows Publisher: Microsoft Operating System: Windows Impact/Access: Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-6111 Original Bulletin: https://technet.microsoft.com/en-us/library/security/MS15-120 - --------------------------BEGIN INCLUDED TEXT-------------------- Microsoft Security Bulletin MS15-120: Security Update for IPSec to Address Denial of Service (3102939) Document Metadata Bulletin Number: MS15-120 Bulletin Title: Security Update for IPSec to Address Denial of Service Severity: Important KB Article: 3102939 Version: 1.0 Published Date: November 10, 2015 Executive Summary This security update resolves a denial of service vulnerability in Microsoft Windows. An attacker who successfully exploited the vulnerability could cause the system to become nonresponsive. To exploit the vulnerability an attacker must have valid credentials. This security update is rated Important for all supported releases of Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. For more information, see the Affected Software section. Affected Software Windows 8 for 32-bit Systems Windows 8 for x64-based Systems Windows 8.1 for 32-bit Systems Windows 8.1 for x64-based Systems Windows Server 2012 Windows Server 2012 R2 Windows RT[1] Windows RT 8.1[1] Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) [1]This update is only available via Windows Update. Vulnerability Information Windows IPSec Denial of Service Vulnerability CVE-2015-6111 A denial of service vulnerability exists in Windows when the Internet Protocol Security (IPSec) service improperly handles encryption negotiation. An attacker who successfully exploited the vulnerability could cause the system to become nonresponsive. To exploit this vulnerability an attacker must have valid credentials. An attacker could exploit this vulnerability by using a malicious application to connect to a target machine and cause the server to become nonresponsive. The update addresses the vulnerability by adding an additional check to verify encryption negotiation. This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2015-6111. At the time this security bulletin was originally issued, Microsoft was unaware of any attack attempting to exploit this vulnerability. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVkKJrX6ZAP0PgtI9AQIt1Q/+OUhYXZDNN8mh5OfayXF+TA+b7P9oEGlu YDnoqFaslRxR8fdjEqHrXS+TgROaLgFRcxfIPowP6C4I6BawuckQvRDUQ2lx/XcB 1X8oBskIBN1hObNdQFGdJUOz5Y2gNqSl9rKPYn5KQZsiPgmrwM8RDCa1mtMnTsng S4NwhR0GC3oYhWBOm9e149p4e0oxKqH2Xg0kQKJsaKSHtKm2RnavHF+JwDHHcdEz 6s3KEO0Q3gehJi18YqQfDsSIu0B+RxSoT9W+kEfhR+ZDWJowDl68fdNHSBjDca7k qmfc0SUmB3lvloABUJniJofyg2yTo49VFdWrhjS9UiSGpo442Cjitu5PCH83A3n5 m3Ucf9WHcCweI56m/juRjoxz6VIpKJgdhYx6aNa+uREM89XNqU2SSmjOSVYlb/Pv FpktAAi1RlrPLNeUbteEWZhVronqvuH+VZgo1m3SWPVKLnXROzTnz4BFQ+4hmV8e JRfXwwKQ1PCvk0a38239ntAjXPhJyQQBnIpaJvafu19zPcjeJaE/vUA34EWHuP+Z quyU/n9g/3eoWdBFomDs24QVEZQPGNi4RHJjb5MAY8+x3y4VOH7hg1fXJKMP1Hpt 1r8Innub5MfXWfl1YpO3b1vzBg3fZXDh1xdstqi41lffZaoLuVHkelMp56oFCeRe M15bCjGzkuI= =+yEj -----END PGP SIGNATURE-----