Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows and Microsoft Remote Desktop Connection Client for Mac, which can be exploited by malicious people to compromise a user's system.
30013980977566f17260f32ba9df386dd0888c76f32d935f1cae3a7f8ff0afbd
----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability
intelligence source on the market.
Implement it through Secunia.
For more information visit:
http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com
----------------------------------------------------------------------
TITLE:
Microsoft Remote Desktop Connection Two Vulnerabilities
SECUNIA ADVISORY ID:
SA36229
VERIFY ADVISORY:
http://secunia.com/advisories/36229/
DESCRIPTION:
Two vulnerabilities have been reported in Microsoft Windows and
Microsoft Remote Desktop Connection Client for Mac, which can be
exploited by malicious people to compromise a user's system.
1) An error exists in the Remote Desktop Connection (RDP)
implementation when processing server responses. This can be
exploited to cause a heap-based buffer overflow by tricking a user
into connecting to a malicious RDP server.
2) An error in the Remote Desktop Web Connection ActiveX control can
be exploited to cause a heap-based buffer overflow by tricking a user
into visiting a malicious website.
Successful exploitation of the vulnerabilities may allow execution of
arbitrary code.
SOLUTION:
Apply patches.
Microsoft Windows 2000 SP4 with RDP Version 5.0:
http://www.microsoft.com/downloads/details.aspx?familyid=027e757d-08d5-4932-b8c4-52ee1be1c864
http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2
Microsoft Windows 2000 SP4 with RDP Version 5.1:
http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2
Microsoft Windows 2000 SP4 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2
Windows XP SP2 with RDP Version 5.1:
http://www.microsoft.com/downloads/details.aspx?familyid=2a8830dd-8fb3-4556-a6e7-2c237235357f
Windows XP SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=2a8830dd-8fb3-4556-a6e7-2c237235357f
Windows XP SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719
Windows XP SP2 with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719
Windows XP SP3 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719
Windows XP SP3 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=cf9f9898-10c8-45ab-9df3-85e0b37e6046
Windows XP Professional x64 Edition SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=948da99a-44ed-4390-b1b4-7ed3f15a9cda
Windows XP Professional x64 Edition SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=5061615f-fa8f-465f-ac8f-393998b7e91b
Windows Server 2003 SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=60c79729-ef01-4630-bd67-ec63e7f8b56b
Windows Server 2003 SP2 with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=a37a2d8a-a5ce-4f06-bf07-8cafa16e7a59
Windows Server 2003 x64 Edition SP2 with RDP Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=57393588-dc96-4bda-ab1e-ae550961e5d4
Windows Server 2003 x64 Edition SP2 with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=957c2e01-89a1-4550-aacb-de8ff896d762
Windows Server 2003 with SP2 for Itanium-based Systems with RDP
Version 5.2:
http://www.microsoft.com/downloads/details.aspx?familyid=8f88a714-b917-4193-9002-19fa65722028
Windows Vista with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=cf95a552-f6fd-4e35-815a-d16c015cd3ea
Windows Vista SP1 and Windows Vista SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=cf95a552-f6fd-4e35-815a-d16c015cd3ea
Windows Vista x64 Edition with RDP Version 6.0:
http://www.microsoft.com/downloads/details.aspx?familyid=5e19cef7-2413-4575-9597-c6273a097aad
Windows Vista x64 Edition SP1/SP2 with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=5e19cef7-2413-4575-9597-c6273a097aad
Windows Server 2008 for 32-bit Systems (optionally with SP2) with RDP
Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=71c17a87-710b-434d-9b2a-2f471674915a
Windows Server 2008 for x64-based Systems (optionally with SP2) with
RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=f095d2d5-4513-4ae1-96c7-cbcf83304261
Windows Server 2008 for Itanium-based Systems (optionally with SP2)
with RDP Version 6.1:
http://www.microsoft.com/downloads/details.aspx?familyid=65d0af4e-22a2-4524-a003-2f4858012fa8
Remote Desktop Connection Client for Mac 2.0:
http://www.microsoft.com/downloads/details.aspx?FamilyID=cd9ec77e-5b07-4332-849f-046611458871
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Wushi of Team509, working with ZDI
2) Yamata Li
ORIGINAL ADVISORY:
MS09-044 (KB956744, KB958469, KB958470, KB958471, KB970927):
http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------