VID |
26451 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (970927) for 'Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution' has not been applied. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms09-044.mspx
* Platforms Affected: Microsoft Windows 2000 SP4 Microsoft Windows XP SP2 and SP3 Microsoft Windows XP Professional x64 SP2 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 x64 SP2 Microsoft Windows Server 2003 SP2 for Itanium-based Microsoft Windows Vista Microsoft Windows Vista SP1 and SP2 Microsoft Windows Vista x64 Microsoft Windows Vista x64 SP1 and SP2 Microsoft Windows Server 2008 Microsoft Windows Server 2008 SP2 Microsoft Windows Server 2008 x64 Microsoft Windows Server 2008 x64 SP2 Microsoft Windows Server 2008 for Itanium-based Microsoft Windows Server 2008 SP2 for Itanium-base |
Recommendation |
Apply the appropriate patch (970927) for your system, as listed in Microsoft Security Bulletin MS09-044 at http://www.microsoft.com/technet/security/bulletin/ms09-0.mspx -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch |
Related URL |
CVE-2009-1930 (CVE) |
Related URL |
35993 (SecurityFocus) |
Related URL |
(ISS) |
|