波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

神话百家乐官网的玩法技巧和规则 | 任你博百家乐官网现金网| 澳门百家乐官网路子分析| 新濠百家乐官网的玩法技巧和规则 | 二八杠下载| 乐百家乐官网彩现金开户| 百家乐官网追号工具| 百家乐高| 百家乐官网园sun811| 百家乐电子| 澳门百家乐官网皇冠网| 百家乐技巧论坛| 民乐县| 百家乐网站建设| 足球盘口| 网上百家乐能作弊吗| 真人二八杠| 大家旺百家乐娱乐城| 365外围网| 百家乐开户就送现金| 南投市| A8百家乐现金网| 百家乐官网微心打法| 百家乐二号博彩正网| 百家乐怎么才赢| 德州扑克教学视频| 百家乐网站排行| 英超| 威尼斯人娱乐城官方网| 百家乐官网手机版| 大发888yulecheng| 葡京百家乐注码| 百家乐桌布| 濮阳市| 金域百家乐的玩法技巧和规则| 百家乐官网韩泰阁| 星空棋牌舟山清墩| 波浪百家乐测试| 麻将百家乐官网筹码| 乐安县| 大发888游戏怎么玩|