Lucene search

K
saintSAINT CorporationSAINT:CD5243D8FA01B98B7DE808CFA0D1DD1A
HistoryMar 14, 2011 - 12:00 a.m.

Microsoft Remote Desktop Connection Insecure Library Injection

2011-03-1400:00:00
SAINT Corporation
download.saintcorporation.com
10

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.958 High

EPSS

Percentile

99.5%

Added: 03/14/2011
CVE: CVE-2011-0029
BID: 46678
OSVDB: 71014

Background

The Windows Remote Desktop allows desktop access to one Windows computer from another Windows computer.

Problem

A library loading vulnerability in the Remote Desktop Client allows arbitrary command execution when a user opens a Remote Desktop (.rdp) configuration file located in the same network directory as a specially crafted DLL file.

Resolution

Apply the update referenced in Microsoft Security Bulletin 11-017.

References

<http://www.microsoft.com/technet/security/Bulletin/MS11-017.mspx&gt;

Limitations

An SMB share which is readable by the target computer, and a user name and password with write access to that share, must be specified.

The target user must open the RDP file located on the specified share.

Platforms

Windows

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.958 High

EPSS

Percentile

99.5%