波音游戏-波音娱乐城赌球打不开

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

百家乐视频游戏注册| 百家乐桩闲落注点| 大发888官方lc8| 大发888娱乐城下载英皇国际| 百家乐官网投注网中国体育| 新东方百家乐官网的玩法技巧和规则 | 马牌百家乐娱乐城| 大发888破解| 百家乐官网视频赌博| 黄金城百家乐苹果版| 专业百家乐官网分析| 百家乐官网平注法到| 蒙特卡罗娱乐场| 风水罗盘24方位| 百家乐官网风云人物| 爱拼百家乐的玩法技巧和规则| 百家乐官网澳门赌| 百家乐官网六手变化混合赢家打法| 百家乐游戏机论坛| 波音百家乐官网现金网投注平台排名导航 | 大发888线上娱乐城加盟合作| 赌百家乐官网的计划跟策略| 贵族百家乐的玩法技巧和规则| 百家乐官网游戏研发| 威尼斯人娱乐城官方站| 粤港澳百家乐官网娱乐网| 免费百家乐过滤| 百家乐官网大赌场娱乐网规则| 威尼斯人娱乐城首选金杯娱乐城 | 大发| 太阳城在线娱乐| 百家乐官网免费是玩| 百家乐如何取胜| 西充县| 真人版百家乐官网试玩| 百家乐官网庄闲筹码| 汉阴县| 大发888娱乐游戏可以玩吗| 鼎龙百家乐的玩法技巧和规则 | 澳门百家乐官网网站| 百家乐官网赌场破解方法|