-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2801
         Microsoft Security Bulletin MS15-120: Security Update for
               IPSec to Address Denial of Service (3102939)
                             11 November 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-6111  

Original Bulletin: 
   https://technet.microsoft.com/en-us/library/security/MS15-120

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS15-120: Security Update for IPSec to Address 
Denial of Service (3102939)

Document Metadata

Bulletin Number: MS15-120

Bulletin Title: Security Update for IPSec to Address Denial of Service

Severity: Important

KB Article: 3102939

Version: 1.0

Published Date: November 10, 2015

Executive Summary

This security update resolves a denial of service vulnerability in Microsoft 
Windows. An attacker who successfully exploited the vulnerability could cause
the system to become nonresponsive. To exploit the vulnerability an attacker 
must have valid credentials.

This security update is rated Important for all supported releases of Windows
8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and 
Windows RT 8.1. For more information, see the Affected Software section.

Affected Software

Windows 8 for 32-bit Systems

Windows 8 for x64-based Systems

Windows 8.1 for 32-bit Systems

Windows 8.1 for x64-based Systems

Windows Server 2012

Windows Server 2012 R2

Windows RT[1]

Windows RT 8.1[1]

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2 (Server Core installation)

[1]This update is only available via Windows Update.

Vulnerability Information

Windows IPSec Denial of Service Vulnerability CVE-2015-6111

A denial of service vulnerability exists in Windows when the Internet Protocol
Security (IPSec) service improperly handles encryption negotiation. An 
attacker who successfully exploited the vulnerability could cause the system 
to become nonresponsive.

To exploit this vulnerability an attacker must have valid credentials. An 
attacker could exploit this vulnerability by using a malicious application to
connect to a target machine and cause the server to become nonresponsive. The
update addresses the vulnerability by adding an additional check to verify 
encryption negotiation.

This vulnerability has been publicly disclosed. It has been assigned Common 
Vulnerability and Exposure number CVE-2015-6111. At the time this security 
bulletin was originally issued, Microsoft was unaware of any attack attempting
to exploit this vulnerability.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+yEj
-----END PGP SIGNATURE-----