CVE-2015-1635
KEV
🔴 Łataj teraz
Wykonanie złośliwego kodu zdalnie w HTTP.sys w systemach Windows przez spreparowane żądania HTTP.
CVSS
9.8
EPSS
94.3%
Exploit
weaponized
Vendor
microsoft
Opis źródłowy (NVD)
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 94.3% |
| Opublikowano (NVD) | 2015-04-14 20:59:01 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 16:42:38 UTC |
Referencje
- http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html (secure@microsoft.com) [Exploit, Third Party Advisory, VDB Entry]
- http://www.osvdb.org/120629 (secure@microsoft.com) [Broken Link]
- http://www.securityfocus.com/bid/74013 (secure@microsoft.com) [Third Party Advisory, VDB Entry, Broken Link]
- http://www.securitytracker.com/id/1032109 (secure@microsoft.com) [Third Party Advisory, VDB Entry, Broken Link]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-034 (secure@microsoft.com) [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/36773/ (secure@microsoft.com) [Exploit, Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/36776/ (secure@microsoft.com) [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-1635 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]