Vulnerability Details : CVE-2015-1635
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
Vulnerability category: Execute code
CVE-2015-1635
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Microsoft HTTP.sys Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Microsoft HTTP protocol stack (HTTP.sys) contains a vulnerability which allows for remote code execution.
Added on
2022-02-10
Action due date
2022-08-10
Exploit prediction scoring system (EPSS) score for CVE-2015-1635
Probability of exploitation activity in the next 30 days: 97.55%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2015-1635
-
MS15-034 HTTP Protocol Stack Request Handling HTTP.SYS Memory Information Disclosure
auxiliary/scanner/http/ms15_034_http_sys_memory_dumpThis module dumps memory contents using a crafted Range header and affects only Windows 8.1, Server 2012, and Server 2012R2. Note that if the target is running in VMware Workstation, this module has a high likelihood of resulting in BSOD; however, VMware ESX and non-virtualized hosts seem stable. Using a larger target file should result in more memory being dumped, and SSL seems to produce more data as well. Authors: - Rich Whitcroft <[email protected]> - sinn3r <[email protected]> - Sunny Neo <[email protected]> -
MS15-034 HTTP Protocol Stack Request Handling Denial-of-Service
auxiliary/dos/http/ms15_034_ulonglongaddThis module will check if scanned hosts are vulnerable to CVE-2015-1635 (MS15-034), a vulnerability in the HTTP protocol stack (HTTP.sys) that could result in arbitrary code execution. This module will try to cause a denial-of-service. Authors: - Bill Finlayson - sinn3r <[email protected]>
CVSS scores for CVE-2015-1635
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
CWE ids for CVE-2015-1635
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: [email protected] (Primary)
References for CVE-2015-1635
-
https://www.exploit-db.com/exploits/36773/
Exploit;Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1032109
Third Party Advisory;VDB Entry
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-034
Patch;Vendor Advisory
-
https://www.exploit-db.com/exploits/36776/
Exploit;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/74013
Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html
Exploit;Third Party Advisory;VDB Entry
Products affected by CVE-2015-1635
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*