

The following are links for downloading patches to fix these vulnerabilities:


Refer to MS15-117 to obtain more information. This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.Įxploitation could allow an attacker to cause privilege escalation attacks. Microsoft has released a security update that corrects how NDIS validates buffer length. An attacker who successfully exploits this vulnerability could gain elevated privileges on a targeted system. Microsoft Windows NDIS Privilege of Elevation Vulnerability (MS15-117)Īn elevation of privilege vulnerability exists when NDIS fails to check the length of a buffer prior to copying memory into it. Qualys has released the following checks for these new vulnerabilities: To fix newly discovered flaws in their software. Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition. Visit Qualys Security Blog to prioritize remediation. Their networks for these and other new vulnerabilities by accessing Vulnerability checks in the Qualys Cloud Platform to protectĪnnounced today by Microsoft. Qualys Vulnerability R&D Lab has released new
