SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Windows Remote Desktop Protocol (RDP) Vendors:   Microsoft
Windows Remote Desktop Protocol (RDP) Flaws Let Remote Users Impersonate Client Sessions and Execute Arbitrary Code
SecurityTracker Alert ID:  1033242
SecurityTracker URL:  http://securitytracker.com/id/1033242
CVE Reference:   CVE-2015-2472, CVE-2015-2473   (Links to External Site)
Date:  Aug 11 2015
Impact:   Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Two vulnerabilities were reported in Windows Remote Desktop Protocol (RDP). A remote user can cause arbitrary code to be executed on the target user's system. A remote user can impersonate client sessions.

The Remote Desktop Session Host (RDSH) does not properly validate RDSH certificates during authentication. A remote user that can conduct a man-in-the-middle attack can impersonate the client session [CVE-2015-2472].

A remote user can create a specially crafted DLL that, when placed in the target user's working directory and when an RDP file is then opened by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Impact:   A remote user can create a binary on the target user's system that, when an RDP file is loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can impersonate a client system.

Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor advisory.

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms15-082

Vendor URL:  technet.microsoft.com/library/security/ms15-082 (Links to External Site)
Cause:   Access control error, Authentication error
Underlying OS:  Windows (2008), Windows (2012), Windows (7), Windows (Vista)
Underlying OS Comments:  Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 2012, 2012 R2

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC