-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.3069
  Microsoft Security Bulletin MS15-134: Security Update for Windows Media
             Center to Address Remote Code Execution (3108669)
                              9 December 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows
Impact/Access:     Access Confidential Data        -- Remote with User Interaction
                   Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-6131 CVE-2015-6127 

Original Bulletin: 
   https://technet.microsoft.com/en-us/library/security/MS15-134

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS15-134: Security Update for Windows Media Center
to Address Remote Code Execution (3108669)

Document Metadata

Bulletin Number: MS15-134

Bulletin Title: Security Update for Windows Media Center to Address Remote 
Code Execution

Severity: Important

KB Article: 3108669

Version: 1.0

Published Date: December 8, 2015

Executive Summary

This security update resolves vulnerabilities in Microsoft Windows. The more 
severe of the vulnerabilities could allow remote code execution if Windows 
Media Center opens a specially crafted Media Center link (.mcl) file that 
references malicious code. An attacker who successfully exploited this 
vulnerability could gain the same user rights as the current user. Customers 
whose accounts are configured to have fewer user rights on the system could be
less impacted than those who operate with administrative user rights.

This security update is rated Important for all supported editions of Windows
Media Center when installed on Windows Vista, Windows 7, Windows 8, or Windows
8.1. For more information, see the Affected Software section.

Affected Software

Windows Media Center

Windows Vista Service Pack 2

Windows Vista x64 Edition Service Pack 2

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows 8 for 32-bit Systems

Windows 8 for x64-based Systems

Windows 8.1 for 32-bit Systems

Windows 8.1 for x64-based Systems

Media Center Library Parsing RCE Vulnerability - CVE-2015-6131

A vulnerability exists in Windows Media Center that could allow remote code 
execution if Windows Media Center opens a specially crafted Media Center link
(.mcl) file that references malicious code. An attacker who successfully 
exploited this vulnerability could take control of an affected system. 
Customers whose accounts are configured to have fewer user rights on the 
system could be less impacted than users who operate with administrative user
rights. Workstations are primarily at risk of this vulnerability.

To exploit the vulnerability, user interaction is required. In a web-browsing
scenario, a user would have to navigate to a compromised website that an 
attacker is using to host a malicious .mcl file. In an email attack scenario,
an attacker would have to convince a user who is logged on to a vulnerable 
workstation to click a specially crafted link in an email. The security update
addresses the vulnerability by correcting how Windows Media Center handles 
certain resources in the .mcl file.

Microsoft received information about this vulnerability through coordinated 
vulnerability disclosure. At the time this security bulletin was originally 
issued, Microsoft was unaware of any attack attempting to exploit this 
vulnerability.

Windows Media Center Information Disclosure Vulnerability - CVE-2015-6127

A vulnerability exists in Windows Media Center that could allow information 
disclosure if Windows Media Center improperly handles a specially crafted 
Media Center link (.mcl) file that references malicious code. An attacker who
successfully exploited the vulnerability could disclose local file system 
information. Workstations are primarily at risk of this vulnerability.

To exploit the vulnerability, user interaction is required. In a web-browsing
scenario, a user would have to navigate to a compromised website that an 
attacker is using to host a malicious .mcl file. In an email attack scenario,
an attacker would have to convince a user who is logged on to a vulnerable 
workstation to click a specially crafted link in an email. The security update
addresses the vulnerability by correcting how Windows Media Center handles 
certain resources in the .mcl file.

Microsoft received information about this vulnerability through coordinated 
vulnerability disclosure. At the time this security bulletin was originally 
issued, Microsoft was unaware of any attack attempting to exploit this 
vulnerability.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVmeQbn6ZAP0PgtI9AQKMdRAAnZb7PJovmrCOFTskUayyIDTG2O+8v1JD
fMVD0vF/axV0rjTkFWlmQC0xxWrqn8PuGmALNMMBa2N6Im6HLceSEMAvneOgHQdw
atuCo/zi4TLDb75ghOcgJgP4umUie5vpBzjvboi1wsJFNy3iIx6egEeaI9R1BJ9Z
pOU6kmbucK0Hncaak7RhWgxCx5oJ8XFnz5jZODO/pIE4YWkW0IksZTzdshJR7uFM
8Df2Kc69If3lq1yBAsnahz61S0C72DHada0okcVANFGgJ0XN9ajx21IboVDzwDDO
EixPYQJB7FSF7Z7xGKaS0SwBCwHfZ53e/t3kffwEyeY5vt8ciJ6P+lBqBJs1tmQU
KyDqITmOhzUhrR1WuFUlSpmoHV+7nR5Ukbz+jF4MFulk/mRby7J0rJqD6vjn+SA/
+JCCImoM4M6Cw76KKzILCPOk6tvnZ7KWA/lhYo6Yi9hip8wuEpcFh/sXotePtBiT
xRq8j4nlScyNp/5SHG2VlT+dDOEfRsWSJPCgEoMuHRpu3N1DbpDAxgODZ3xj1pNE
C7fvyzU2G5SdY3v6IVlsY0yEhl5Flo4hBuqolYSM7pqkC+yLwKb7cbagSi2stOpV
pkirzfMMU/gXaYacfjmh8aYlsitlXiCAA2MgOpwrEIDZudd47UDIXCajYnFv5FMC
jZyiSq6FDQE=
=BKxB
-----END PGP SIGNATURE-----