VID |
26628 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (MS12-053, 2723135) for 'Vulnerabilities in Remote Desktop Could Allow Remote Code Execution' has not been applied. This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability is caused when the Remote Desktop Protocol processes a sequence of specially crafted packets, resulting in the access of an object in memory that has been deleted. For that reason, a remote unauthenticated attacker could exploit this vulnerability by sending a sequence of specially crafted RDP packets to the target system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://technet.microsoft.com/en-us/security/bulletin/MS12-053
* Platforms Affected: Windows XP Service Pack 3 |
Recommendation |
Apply the appropriate patch (2723135)for your system, as listed in Microsoft Security Bulletin MS12-053 at http://technet.microsoft.com/en-us/security/bulletin/MS12-053 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2012-2526 (CVE) |
Related URL |
54935 (SecurityFocus) |
Related URL |
(ISS) |
|