HTTP: Microsoft Windows CVE-2015-6102 Remote Code Execution

This signature detects an attempt to exploit a known Vulnerability in Microsoft Windows Operating System. Successful exploitation could allow an attacker to execute arbitrary code into the application's context.

Extended Description

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."

Affected Products

Microsoft windows_rt_8.1

References

CVE: CVE-2015-6102

Short Name
HTTP:STC:DL:CVE-2015-6102-RCE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2015-6102 Code Execution Microsoft Remote Windows
Release Date
11/10/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

2.1

Found a potential security threat?