---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Microsoft Remote Desktop Connection Two Vulnerabilities SECUNIA ADVISORY ID: SA36229 VERIFY ADVISORY: http://secunia.com/advisories/36229/ DESCRIPTION: Two vulnerabilities have been reported in Microsoft Windows and Microsoft Remote Desktop Connection Client for Mac, which can be exploited by malicious people to compromise a user's system. 1) An error exists in the Remote Desktop Connection (RDP) implementation when processing server responses. This can be exploited to cause a heap-based buffer overflow by tricking a user into connecting to a malicious RDP server. 2) An error in the Remote Desktop Web Connection ActiveX control can be exploited to cause a heap-based buffer overflow by tricking a user into visiting a malicious website. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. SOLUTION: Apply patches. Microsoft Windows 2000 SP4 with RDP Version 5.0: http://www.microsoft.com/downloads/details.aspx?familyid=027e757d-08d5-4932-b8c4-52ee1be1c864 http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2 Microsoft Windows 2000 SP4 with RDP Version 5.1: http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2 Microsoft Windows 2000 SP4 with RDP Version 5.2: http://www.microsoft.com/downloads/details.aspx?familyid=ae72782e-920f-4176-a27b-c3b91d50c7d2 Windows XP SP2 with RDP Version 5.1: http://www.microsoft.com/downloads/details.aspx?familyid=2a8830dd-8fb3-4556-a6e7-2c237235357f Windows XP SP2 with RDP Version 5.2: http://www.microsoft.com/downloads/details.aspx?familyid=2a8830dd-8fb3-4556-a6e7-2c237235357f Windows XP SP2 with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719 Windows XP SP2 with RDP Version 6.0: http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719 Windows XP SP3 with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=d1f82d76-eeb2-4ff4-9d2c-46882f214719 Windows XP SP3 with RDP Version 5.2: http://www.microsoft.com/downloads/details.aspx?familyid=cf9f9898-10c8-45ab-9df3-85e0b37e6046 Windows XP Professional x64 Edition SP2 with RDP Version 5.2: http://www.microsoft.com/downloads/details.aspx?familyid=948da99a-44ed-4390-b1b4-7ed3f15a9cda Windows XP Professional x64 Edition SP2 with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=5061615f-fa8f-465f-ac8f-393998b7e91b Windows Server 2003 SP2 with RDP Version 5.2: http://www.microsoft.com/downloads/details.aspx?familyid=60c79729-ef01-4630-bd67-ec63e7f8b56b Windows Server 2003 SP2 with RDP Version 6.0: http://www.microsoft.com/downloads/details.aspx?familyid=a37a2d8a-a5ce-4f06-bf07-8cafa16e7a59 Windows Server 2003 x64 Edition SP2 with RDP Version 5.2: http://www.microsoft.com/downloads/details.aspx?familyid=57393588-dc96-4bda-ab1e-ae550961e5d4 Windows Server 2003 x64 Edition SP2 with RDP Version 6.0: http://www.microsoft.com/downloads/details.aspx?familyid=957c2e01-89a1-4550-aacb-de8ff896d762 Windows Server 2003 with SP2 for Itanium-based Systems with RDP Version 5.2: http://www.microsoft.com/downloads/details.aspx?familyid=8f88a714-b917-4193-9002-19fa65722028 Windows Vista with RDP Version 6.0: http://www.microsoft.com/downloads/details.aspx?familyid=cf95a552-f6fd-4e35-815a-d16c015cd3ea Windows Vista SP1 and Windows Vista SP2 with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=cf95a552-f6fd-4e35-815a-d16c015cd3ea Windows Vista x64 Edition with RDP Version 6.0: http://www.microsoft.com/downloads/details.aspx?familyid=5e19cef7-2413-4575-9597-c6273a097aad Windows Vista x64 Edition SP1/SP2 with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=5e19cef7-2413-4575-9597-c6273a097aad Windows Server 2008 for 32-bit Systems (optionally with SP2) with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=71c17a87-710b-434d-9b2a-2f471674915a Windows Server 2008 for x64-based Systems (optionally with SP2) with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=f095d2d5-4513-4ae1-96c7-cbcf83304261 Windows Server 2008 for Itanium-based Systems (optionally with SP2) with RDP Version 6.1: http://www.microsoft.com/downloads/details.aspx?familyid=65d0af4e-22a2-4524-a003-2f4858012fa8 Remote Desktop Connection Client for Mac 2.0: http://www.microsoft.com/downloads/details.aspx?FamilyID=cd9ec77e-5b07-4332-849f-046611458871 PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Wushi of Team509, working with ZDI 2) Yamata Li ORIGINAL ADVISORY: MS09-044 (KB956744, KB958469, KB958470, KB958471, KB970927): http://www.microsoft.com/technet/security/Bulletin/MS09-044.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------