SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Windows Remote Desktop Protocol (RDP) Vendors:   Microsoft
Windows Remote Desktop Protocol (RDP) Packet Handling Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1032896
SecurityTracker URL:  http://securitytracker.com/id/1032896
CVE Reference:   CVE-2015-2373   (Links to External Site)
Date:  Jul 14 2015
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Windows Remote Desktop Protocol (RDP). A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted RDP packets to cause denial of service conditions or execute arbitrary code on the target system. The code will run with the privileges of the target service.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions on the target remote desktop terminal service.

Solution:   The vendor has issued a fix.

Windows 7 for 32-bit Systems SP1 (3067904):

https://www.microsoft.com/downloads/details.aspx?familyid=657A7331-A546-4E28-ADDB-C0764ED214E4

Windows 7 for 32-bit Systems SP1 (3069762):

https://www.microsoft.com/downloads/details.aspx?familyid=6D4A2D99-A70F-4940-B659-329E0131D51E

Windows 7 for x64-based Systems SP1 (3067904):

https://www.microsoft.com/downloads/details.aspx?familyid=6d810831-a33a-4cb8-aee0-65c3aea448b0

Windows 7 for x64-based Systems SP1 (3069762):

https://www.microsoft.com/downloads/details.aspx?familyid=2a03bdd6-e5f8-4030-87bb-bdac205a94f8

Windows 8 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=a39691eb-1c80-426d-8c8f-2c0e0837bc91

Windows 8 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=73840545-3f2f-4b1f-9e21-660ea6865a2d

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=47dbac89-9f66-49de-9bd0-25c2cf9e18f2

Windows Server 2012 (Server Core installation):

https://www.microsoft.com/downloads/details.aspx?familyid=47dbac89-9f66-49de-9bd0-25c2cf9e18f2

A restart may be required.

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms15-067

Vendor URL:  technet.microsoft.com/library/security/ms15-067 (Links to External Site)
Cause:   Not specified
Underlying OS:  Windows (2012), Windows (7), Windows (8)
Underlying OS Comments:  7 SP1, 8, 2012

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC