what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 36229

Secunia Security Advisory 36229
Posted Aug 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows and Microsoft Remote Desktop Connection Client for Mac, which can be exploited by malicious people to compromise a user's system.

tags | advisory, remote, vulnerability
systems | windows
SHA-256 | 30013980977566f17260f32ba9df386dd0888c76f32d935f1cae3a7f8ff0afbd

Secunia Security Advisory 36229

Change Mirror Download
----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability
intelligence source on the market.

Implement it through Secunia.

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
Microsoft Remote Desktop Connection Two Vulnerabilities

SECUNIA ADVISORY ID:
SA36229

VERIFY ADVISORY:
http://secunia.com/advisories/36229/

DESCRIPTION:
Two vulnerabilities have been reported in Microsoft Windows and
Microsoft Remote Desktop Connection Client for Mac, which can be
exploited by malicious people to compromise a user's system.

1) An error exists in the Remote Desktop Connection (RDP)
implementation when processing server responses. This can be
exploited to cause a heap-based buffer overflow by tricking a user
into connecting to a malicious RDP server.

2) An error in the Remote Desktop Web Connection ActiveX control can
be exploited to cause a heap-based buffer overflow by tricking a user
into visiting a malicious website.

Successful exploitation of the vulnerabilities may allow execution of
arbitrary code.

SOLUTION:
Apply patches.

Microsoft Windows 2000 SP4 with RDP Version 5.0:
http://www.microsoft.com/downloads/details.aspx?familyid=027e757d-08d5-4932-b8c4-52ee1be1c864
http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2

Microsoft Windows 2000 SP4 with RDP Version 5.1:
http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2

Microsoft Windows 2000 SP4 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2

Windows XP SP2 with RDP Version 5.1:
http://www.microsoft.com/downloads/details.aspx?familyid=2a8830dd-8fb3-4556-a6e7-2c237235357f

Windows XP SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=2a8830dd-8fb3-4556-a6e7-2c237235357f

Windows XP SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719

Windows XP SP2 with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719

Windows XP SP3 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719

Windows XP SP3 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=cf9f9898-10c8-45ab-9df3-85e0b37e6046

Windows XP Professional x64 Edition SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=948da99a-44ed-4390-b1b4-7ed3f15a9cda

Windows XP Professional x64 Edition SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=5061615f-fa8f-465f-ac8f-393998b7e91b

Windows Server 2003 SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=60c79729-ef01-4630-bd67-ec63e7f8b56b

Windows Server 2003 SP2 with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=a37a2d8a-a5ce-4f06-bf07-8cafa16e7a59

Windows Server 2003 x64 Edition SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=57393588-dc96-4bda-ab1e-ae550961e5d4

Windows Server 2003 x64 Edition SP2 with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=957c2e01-89a1-4550-aacb-de8ff896d762

Windows Server 2003 with SP2 for Itanium-based Systems with RDP
Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=8f88a714-b917-4193-9002-19fa65722028

Windows Vista with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=cf95a552-f6fd-4e35-815a-d16c015cd3ea

Windows Vista SP1 and Windows Vista SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=cf95a552-f6fd-4e35-815a-d16c015cd3ea

Windows Vista x64 Edition with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=5e19cef7-2413-4575-9597-c6273a097aad

Windows Vista x64 Edition SP1/SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=5e19cef7-2413-4575-9597-c6273a097aad

Windows Server 2008 for 32-bit Systems (optionally with SP2) with RDP
Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=71c17a87-710b-434d-9b2a-2f471674915a

Windows Server 2008 for x64-based Systems (optionally with SP2) with
RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=f095d2d5-4513-4ae1-96c7-cbcf83304261

Windows Server 2008 for Itanium-based Systems (optionally with SP2)
with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=65d0af4e-22a2-4524-a003-2f4858012fa8

Remote Desktop Connection Client for Mac 2.0:
http://www.microsoft.com/downloads/details.aspx?FamilyID=cd9ec77e-5b07-4332-849f-046611458871

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Wushi of Team509, working with ZDI
2) Yamata Li

ORIGINAL ADVISORY:
MS09-044 (KB956744, KB958469, KB958470, KB958471, KB970927):
http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close