百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

真人百家乐官网作| 百家乐官网21点桌| 威尼斯人娱乐城现金开户| 太阳城线上娱乐城| 武冈市| 百家乐赌博策略论坛| 赌博百家乐官网的乐趣| 威尼斯人娱乐城怎么样| 百家乐官网路珠多少钱| 百家乐10个人| 博彩业| 有百家乐的游戏平台| bet365备用 必发| 皇冠百家乐官网的玩法技巧和规则| 如何玩百家乐的玩法技巧和规则| 百家乐投注打三断| 澳门博彩公司| 百家乐遥控洗牌器| 如何看百家乐官网的路纸| 大发888娱乐成| 网上玩百家乐技巧| 百家乐官网技巧阅读| 百家乐赌场软件| 百家乐官网保单破解方法| 济州岛百家乐的玩法技巧和规则| 在线百家乐官网怎么下注| 豪门娱乐| 威尼斯人娱乐城线上博彩| 澳门赌百家乐打法| 网上百家乐官网赌场| 百家乐珠盘路| 八卦图24山代表的| 于都县| 百家乐7赢6| 百家乐官网博彩网太阳城娱乐城| 澳门百家乐官网门路| 新运博娱乐| 大发888玩的人多吗| 乐九百家乐娱乐城| 百家乐官网十佳投庄闲法| 大发888下载并安装|