波音游戏-波音娱乐城赌球打不开

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

百家乐官网大西洋城v| 百威百家乐官网的玩法技巧和规则 | 好望角百家乐官网的玩法技巧和规则| 今晚六合彩开奖结果| 百家乐官网最新分析仪| 大发888娱乐城欢迎lm0| 如何赢百家乐官网的玩法技巧和规则 | 稻城县| 百家乐游戏类型| 墨竹工卡县| 百家乐游戏机破解方法| 关于百家乐官网概率的书| 百家乐游戏类型| 宁武县| 乐中百家乐的玩法技巧和规则| 澳门百家乐官网几副牌| 瑞士百家乐的玩法技巧和规则 | 大发888娱乐场1888| 赌场百家乐官网的玩法技巧和规则| 516棋牌游戏下载| 百家乐博彩策略论坛| 百家乐官网是否有规律| 太阳城公司| 百家乐视频世界| 玩百家乐官网是否有技巧| 大发888娱乐城游戏下载| 百家乐洗码软件| 赌场百家乐官网投注公式| 沙龙百家乐官网娱乐平台| 太阳城申博娱乐城| 百家乐赌假的工具| 澳门百家乐官网路子分析| 瑞博| 大世界百家乐的玩法技巧和规则| 百家乐官网变牌器批发| 玩博论坛| 百家乐游戏模拟| 百家乐官网娱乐平台官网网| 战神娱乐城| 澳门百家乐网络游戏信誉怎么样| 百家乐官网资深 |