CVE-2015-1635

CRITICAL KEV NUCLEI

MS15-034 HTTP Protocol Stack Request Handling Denial-of-Service

Title source: metasploit

Description

HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."

Exploits (21)

exploitdb WORKING POC
by laurent gaffie · pythondoswindows
https://www.exploit-db.com/exploits/36776
exploitdb SCANNER
by rhcp011235 · cdoswindows
https://www.exploit-db.com/exploits/36773
nomisec SCANNER 10 stars
by technion · poc
https://github.com/technion/erlvulnscan
nomisec SCANNER 9 stars
by aedoo · dos
https://github.com/aedoo/CVE-2015-1635-POC
nomisec SCANNER 2 stars
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2015-1635-POC
nomisec SCANNER 2 stars
by Zx7ffa4512-Python · dos
https://github.com/Zx7ffa4512-Python/Project-CVE-2015-1635
nomisec SCANNER 1 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2015-1635
nomisec WORKING POC 1 stars
by w01ke · dos
https://github.com/w01ke/CVE-2015-1635-POC
nomisec SCANNER 1 stars
by bongbongco · dos
https://github.com/bongbongco/MS15-034
nomisec SCANNER
by moeinmiadi · dos
https://github.com/moeinmiadi/CVE-2015-1635_PoC
nomisec SCANNER
by SkinAir · dos
https://github.com/SkinAir/ms15-034-Scan
nomisec WORKING POC
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2015-1635
nomisec SCANNER
by u0pattern · dos
https://github.com/u0pattern/Remove-IIS-RIIS
nomisec SCANNER
by wiredaem0n · dos
https://github.com/wiredaem0n/chk-ms15-034
nomisec SCANNER
by hedgecore · poc
https://github.com/hedgecore/HTTPsys
metasploit WORKING POC
by Bill Finlayson, sinn3r · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/ms15_034_http_sys_memory_dump.rb
patchapalooza WORKING POC
by n3rdh4x0r · dos
https://github.com/n3rdh4x0r/CVE-2015-1635
patchapalooza SCANNER
by n3rdh4x0r · dos
https://github.com/n3rdh4x0r/CVE-2015-1635-POC
patchapalooza SCANNER
by yaogodv · poc
https://gitee.com/yaogodv/Project-CVE-2015-1635

Nuclei Templates (1)

Microsoft Windows 'HTTP.sys' - Remote Code Execution
CRITICALVERIFIEDby Phillipo
Shodan: "Microsoft-IIS" "2015" || "microsoft-iis" "2015" || cpe:"cpe:2.3:o:microsoft:windows_7"

Scores

CVSS v3 9.8
EPSS 0.9431
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-02-10
VulnCheck KEV 2021-04-12
InTheWild.io 2022-02-10
ENISA EUVD EUVD-2015-1765
CWE
CWE-94
Status published
Products (6)
microsoft/windows_7
microsoft/windows_8
microsoft/windows_8.1
microsoft/windows_server_2008 r2 sp1 (2 CPE variants)
microsoft/windows_server_2012
microsoft/windows_server_2012 r2
Published Apr 14, 2015
KEV Added Feb 10, 2022
Tracked Since Feb 18, 2026