Microsoft Windows Remote Desktop Protocol Denial of Service Vulnerability
RISK: High Risk
TYPE: Operating Systems - Windows OS
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker creates multiple RDP sessions that fail to properly free objects in memory. Note that the denial of service would not allow an attacker to execute code or to elevate their user rights. However, it could prevent legitimate users from logging on through remote desktop. An unauthenticated attacker could use this vulnerability to exhaust the system memory by creating multiple RDP sessions. An attacker who successfully exploited the vulnerability could cause the target system to stop responding. The update addresses the vulnerability by correcting how RDP manages objects in memory.
Impact
- Denial of Service
System / Technologies affected
- Windows 7
- Windows 8 and Windows 8.1
- Windows Server 2012 and Windows Server 2012 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
https://technet.microsoft.com/en-us/library/security/MS15-030
Vulnerability Identifier
Source
Related Link
Share with