MS15-053: Vulnerabilities in JScript and VBScript scripting engines could allow security feature bypass: May 12, 2015

Applies to: Windows Server 2008 Service Pack 2Windows Server 2008 DatacenterWindows Server 2008 Enterprise More

Summary


This security update resolves address space layout randomization (ASLR) security feature bypasses in the JScript and VBScript scripting engines in Microsoft Windows. An attacker could use one of these ASLR bypasses together with another vulnerability, such as a remote code execution vulnerability, to more reliably run arbitrary code on a target system. 

The update addresses the ASLR bypasses by helping to make sure that affected versions of JScript and VBScript correctly implement the ASLR security feature. 

Introduction


Microsoft has released security bulletin MS15-053. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates:
Support for Microsoft Update

Security solutions for IT professionals:
TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware:
Virus Solution and Security Center

Local support according to your country:
International Support

More Information


Known issues and more information about this security update

The following articles contain more information about this security update as it relates to individual product versions. The articles may contain known issue information. If this is the case, the known issue is listed under each article link.
  • 3050941 MS15-053: Description of the security update for VBScript and JScript 5.8: May 12, 2015
  • 3050945 MS15-053: Description of the security update for VBScript and JScript 5.7: May 12, 2015
  • 3050946 MS15-053: Description of the security update for VBScript and JScript 5.6: May 12, 2015

File information