Korean
<< Back
VID 26156
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The hotfix (KB899591) for 'Denial of Service Vulnerability in Remote Desktop Protocol' has not been applied. Remote Desktop Protocol (RDP) lets users create a virtual session on their desktop computers. It allows remote users to access all the data and applications on their computers. Microsoft Windows 2000 Server, Windows XP and Windows Server 2003 could allow a remote attacker to cause a system to stop responding, caused by a vulnerability in the Remote Desktop Protocol (RDP). A remote attacker could send a specially-crafted Remote Data Protocol (RDP) message to cause an affected system to crash.
By default, the Remote Desktop Protocol (RDP) is not enabled on any operating system version.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms05-041.mspx

* Platforms Affected:
Microsoft Windows 2000 Server Service Pack 4
Microsoft Windows XP Service Pack 2
Microsoft Windows Server 2003 Service Pack 1
Recommendation Apply the appropriate patch (KB899591) for your system, as listed in Microsoft Security Bulletin MS05-041 at http://www.microsoft.com/technet/security/bulletin/ms05-041.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2005-0058 (CVE)
Related URL 14518 (SecurityFocus)
Related URL 21599 (ISS)