百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

百家乐官网在线赌场| 百家乐编单短信接收| 赌场百家乐官网投注公式| 百家乐赌博详解| 金赞百家乐现金网| 真博百家乐官网的玩法技巧和规则 | 澳门百家乐官网庄闲的玩法| 盈丰国际平台| 人气最高棋牌游戏| 大发888娱乐场存款| 南宁百家乐的玩法技巧和规则| 百家乐注码论坛| 杨公24山向水法吉凶断| 戒掉百家乐官网的玩法技巧和规则| 百家乐官网合法| 百家乐官网赌场论坛| 香港六合彩报码室| 99棋牌游戏| 最好的百家乐官网好评平台都有哪些 | 同花顺百家乐娱乐城| 真人游戏网站| 上海百家乐的玩法技巧和规则| 机械手百家乐的玩法技巧和规则 | 大发888 asia| 大发888游戏秘籍| 百家乐庄闲桌| 亿乐棋牌游戏大厅| 正蓝旗| 海王星线上娱乐| 尊爵国际娱乐| 百家乐官网视频下载地址| 百家乐官网玄机| 百家乐官网这样赢保单分析 | 百家乐注册送免费金| 百家乐怎样玩的| 大发888游戏官方| 百家乐破解| 大连百家乐商场| bet365足球| 百家乐官网赌博玩法技巧| 玩百家乐官网去哪个娱乐城最安全 |