Vulnerability Change Records for CVE-2015-1769

Change History

CPE Deprecation Remap 5/08/2019 6:3:15 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:microsoft:windows_server_2012:r2:-:-:*:essentials:*:*:*
OR
     *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*

CPE Deprecation Remap 5/08/2019 6:11:29 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:microsoft:windows_8.1:-:-:-:*:-:-:x64:*
OR
     *cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:x64:*

Modified Analysis 5/14/2019 3:38:54 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*
     *cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*
     *cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:x64:*
     *cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:x86:*
     *cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:x64:*
     *cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:x86:*
     *cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_rt:-:gold:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*
     *cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

								
						
Added CWE

								
							
							
						
CWE-264
Removed CWE
CWE-59

								
						
Changed Reference Type
http://www.securitytracker.com/id/1033244 No Types Assigned
http://www.securitytracker.com/id/1033244 Third Party Advisory, VDB Entry
Changed Reference Type
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-085 No Types Assigned
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-085 Patch, Vendor Advisory

CVE Modified by Microsoft Corporation 10/12/2018 6:9:11 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-085 [No Types Assigned]
Removed Reference
http://technet.microsoft.com/security/bulletin/MS15-085 [Patch, Vendor Advisory]

								
						

CVE Translated 8/26/2015 8:45:01 PM

Action Type Old Value New Value
Added Translation

								
							
							
						
Vulnerabilidad en el Mount Manager en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1; y Windows 10 no manejan correctamente los links simbólicos, lo que permite a atacantes físicamente próximos ejecutar código arbitrario mediante la conexión de un dispositivo USB manipulado, también conocido como "Mount Manager Elevation of Privilege Vulnerability."
Removed Translation
Vulnerabilidad en el Mount Manager en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1; y Windows 10 no manejan correctamente los symlinks, lo que permite a atacantes físicamente próximos ejecutar código arbitrario mediante la conexión de un dispositivo USB manipulado, también conocido como "Mount Manager Elevation of Privilege Vulnerability."

								
						

CPE Deprecation Remap 5/08/2019 6:3:15 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:microsoft:windows_server_2012:r2:-:-:*:standard:*:*:*
OR
     *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*

Modified Analysis 10/16/2015 2:5:04 PM

Action Type Old Value New Value
Changed Reference Type
http://blogs.technet.com/b/srd/archive/2015/08/11/defending-against-cve-2015-1769-a-logical-issue-exploited-via-a-malicious-usb-stick.aspx No Types Assigned
http://blogs.technet.com/b/srd/archive/2015/08/11/defending-against-cve-2015-1769-a-logical-issue-exploited-via-a-malicious-usb-stick.aspx Advisory

CVE Modified by Microsoft Corporation 9/20/2017 9:29:03 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securitytracker.com/id/1033244 [No Types Assigned]

Initial CVE Analysis 8/17/2015 10:2:12 AM

Action Type Old Value New Value

CVE Modified by Source 10/14/2015 9:59:02 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://blogs.technet.com/b/srd/archive/2015/08/11/defending-against-cve-2015-1769-a-logical-issue-exploited-via-a-malicious-usb-stick.aspx

CPE Deprecation Remap 5/08/2019 6:11:29 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:microsoft:windows_8.1:-:-:-:*:-:-:x86:*
OR
     *cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:x86:*

CPE Deprecation Remap 5/08/2019 6:3:15 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:microsoft:windows_server_2012:r2:-:-:*:datacenter:*:*:*
OR
     *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*