波音游戏-波音娱乐城赌球打不开

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

四平市| 帝王百家乐官网全讯网2| 缅甸百家乐博彩真假| 澳门博彩有限公司| 百家乐轮盘桌| 百家乐官网趋势方向| 大世界百家乐赌场娱乐网规则| 澳门百家乐官网会出千吗| 威尼斯人娱乐场色碟| 全景网百家乐官网的玩法技巧和规则| 速博国际娱乐| 真人百家乐怎么玩| 百家乐官网五湖四海赌场娱乐网规则 | 金城百家乐买卖路| 网上玩百家乐官网的玩法技巧和规则 | 百家乐官网连开6把小| 大发888娱乐城官方| 哪个百家乐投注比较好| 赌场百家乐官网技巧| 丽都百家乐官网的玩法技巧和规则 | 大发888注册步骤| 富裕县| bet365滚球| 大发888手机版下载| 百家乐高人破解| 中国百家乐官网技巧软件| 南昌市| 大世界娱乐城真人娱乐| 联合百家乐官网的玩法技巧和规则| 咸丰县| 大发888游戏平台 df888ylcxz46 | 太阳城77scs| 大发888怎么样| 澳门百家乐博彩网| 太子百家乐官网娱乐城| 百家乐官网棋牌作弊器| 保康县| 常山县| 大发888娱乐游戏下载 官方网| 百家乐号破| 威尼斯人娱乐场 赌场网址|