Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-017.
Impact
Successful exploitation could allow authenticated attackers to execute arbitrary code with elevated privileges.
Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/Bulletin/MS11-017.mspx
Insight
The flaw is caused by the way Windows Remote Desktop Client handles loading of DLL files. Remote attacker can execute arbitrary code by tricking a user to open a legitimate Remote Desktop configuration file (.rdp) that is located in the same network directory as a specially crafted dynamic link library (DLL) file.
Affected
Remote Desktop Connection 5.2 Client
- Windows XP Service Pack 3 and prior
Remote Desktop Connection 6.0/6.1 Client
- Windows XP Service Pack 3
- Windows Vista Service Pack 2 and prior
- Windows Server 2003 Service Pack 2 and prior
- Windows Server 2008 Service Pack 2 and prior
Remote Desktop Connection 7.0 Client
- Windows 7
- Windows XP Service Pack 3 and prior
- Windows Vista Service Pack 2 and prior
References
Severity
Classification
-
CVE CVE-2011-0029 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Embedded OpenType Font Engine Remote Code Execution Vulnerability (982132)
- Message Queuing Remote Code Execution Vulnerability (951071)
- Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
- Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
- Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))