波音游戏-波音娱乐城赌球打不开

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

做生意门面对着什么方向好| 百家乐如何取胜| 百家乐官网h游戏怎么玩| 鑫鑫百家乐的玩法技巧和规则| 伯爵百家乐官网的玩法技巧和规则| 香港六合彩彩色图库| 大发888捕鱼游戏| 百家乐娱乐礼金| 百家乐官网休闲游戏| 威尼斯人娱乐城首选d77com| 百家乐系列抢庄龙| 百家乐真钱电玩| 娱乐城百家乐怎么样| 无锡百家乐官网的玩法技巧和规则 | 瓦房店市| 百家乐官网庄闲机率分析| 真人百家乐官网是骗局| 百家乐官网波音平台路单| 百家乐官网全讯网娱乐城| 百家乐官网多少点数算赢| 百家乐官网桌小| 三国百家乐官网的玩法技巧和规则| 娱乐城百家乐官网的玩法技巧和规则| 百家乐官网规律和方法| 赌场百家乐官网台| 百家乐官网第三张规则| 百家乐注册18元体验金| 怎么赢百家乐的玩法技巧和规则| 大发888bet| 3d俄罗斯轮盘| CEO百家乐官网现金网| 广州百家乐官网扫描分析| 海威百家乐官网赌博机| 蓝盾百家乐官网赌城| 百家乐真人百家乐皇冠开户| 百家乐筹码方形| 新百家乐庄闲路单图记录| 百家乐官网技巧平注常赢法| 赌场百家乐打法| 大发888娱乐场客户端| 缅甸百家乐官网赌场娱乐网规则|