百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Remote Desktop

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Vulnerabilities in Remote Desktop Connection

Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control of an affected system. Exploitation occurs if a user uses Microsoft Remote Desktop Connection to connect to a malicious RDP server, or if a user visits a web page or opens a malicious e-mail attachment which is specifically crafted to take advantage of these vulnerabilities.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

A recent vulnerability (MS09-044) has been discovered in Aug 2009 in the Microsoft Remote Desktop Connection that could allow an attacker to take complete control of an affected system.

 

- Description of vulnerability - The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted web site that exploits this vulnerability.

 

- Impact of vulnerability - Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

- Affected RDP versions - Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3.

 

- Recommendation - Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.

Read More [Next article]

 

永利高百家乐官网网址| 威尼斯人娱乐城真人游戏| 百家乐官网五湖四海娱乐| 百家乐赢钱面面观| 博久百家乐官网论坛| 三元风水24山水法| 澳门线上赌场| ewin棋牌官网| 百家乐官网娱乐网77scs| 百家乐官网平台凯发| 大发888东方鸿运| 现场百家乐官网机| bet365投注体育比赛合法吗| 百家乐平台租用| qq德州扑克怎么玩| 百家乐小游戏开发| 株洲市| 三公百家乐在线哪里可以玩| 百家乐官网最新道具| 百家乐赌博策略论坛| 百家乐官网发牌靴发牌盒| 现金百家乐攻略| 百家乐官网赌博论坛| 皇冠在线娱乐城| 百家乐官网透明发牌机| 百家乐官网制胜秘| 娱乐城送18| 澳门百家乐走势图| 百家乐官网打揽法| 百家乐官网冯式打法| 百家乐群到shozo网| 做生意房子选哪个方位| 百家乐官网玩法的技巧| 百家乐足球投注网哪个平台网址测速最好 | 稳赢的百家乐官网投注方法| 百家乐群lookcc| 百家乐技巧娱乐博彩| 百家乐官网出老千视频| 百家乐官网最保险的方法| 都江堰市| 伟易博|