Skip to main content

Microsoft Windows Remote Desktop Protocol Denial of Service Vulnerability

Last Update Date: 12 Mar 2015 Release Date: 11 Mar 2015 3717 Views

RISK: High Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker creates multiple RDP sessions that fail to properly free objects in memory. Note that the denial of service would not allow an attacker to execute code or to elevate their user rights. However, it could prevent legitimate users from logging on through remote desktop. An unauthenticated attacker could use this vulnerability to exhaust the system memory by creating multiple RDP sessions. An attacker who successfully exploited the vulnerability could cause the target system to stop responding. The update addresses the vulnerability by correcting how RDP manages objects in memory.


Impact

  • Denial of Service

System / Technologies affected

  • Windows 7
  • Windows 8 and Windows 8.1
  • Windows Server 2012 and Windows Server 2012 R2
     

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link