百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

试玩百家乐1000| 段风水24宿| 百家乐发牌| 利来娱乐开户| 天博百家乐官网娱乐城| 澳门百家乐介绍| 观塘区| 百家乐官网博娱乐赌百家乐官网的玩法技巧和规则 | 百家乐官网赌局| 百家乐菲律宾| 百家乐官网怎么样投注| 百家乐下注口诀| 百家乐官网最新赌王| 鼎龙百家乐官网的玩法技巧和规则 | 棋牌百家乐程序破解| 大发888 备用6222.com| 广州百家乐官网赌博机| 百家乐常用公式| 敦化市| 做生意摆放什么会招财| 广发娱乐城| 威尼斯人娱乐场 澳门赌场| 皇冠在线娱乐| 南京百家乐赌博现场被抓| 百家乐官网国际娱乐平台| 无棣县| 大发888娱乐城注册lm0| 百家乐官网赌马| 临沭县| 97玩棋牌游戏中心| 永利百家乐开户| 六合彩136| 百家乐怎么才赢| 百家乐官网象棋玩法| 立博网站| 威尼斯人娱乐城网上赌场| 百家乐官网怎么稳赢| 百家乐官网软件l柳州| 百家乐娱乐网官网网| 香港百家乐官网赌场娱乐网规则 | 罗盘24山图|