Microsoft RDP Remote Code Execution Vulnerabilities
Last Update Date:
14 Aug 2015
Release Date:
12 Aug 2015
3676
Views
RISK: High Risk
TYPE: Operating Systems - Windows OS
- Remote Desktop Session Host Spoofing Vulnerability
A spoofing vulnerability exists when the Remote Desktop Session Host (RDSH) improperly validates certificates during authentication. An attacker who successfully exploited this vulnerability could impersonate the client session. - Remote Desktop Protocol DLL Planting Remote Code Execution Vulnerability
A remote code execution vulnerability exists when Microsoft Windows Remote Desktop Protocol client improperly handles the loading of certain specially crafted DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Impact
- Remote Code Execution
- Spoofing
System / Technologies affected
- Microsoft Windows Vista
- Microsoft Windows Server 2008
- Microsoft Windows 7
- Microsoft Windows Server 2008 R2
- Microsoft Windows 8 and Windows 8.1
- Microsoft Windows Server 2012 and Windows Server 2012 R2
- Microsoft Windows RT and Windows RT 8.1
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
https://technet.microsoft.com/en-us/library/security/MS15-082
Vulnerability Identifier
Source
Related Link
Share with