Summary
This host is missing a critical security update according to Microsoft Bulletin MS09-044.
Impact
Successful exploitation will let the attacker execute arbitrary code which may result in heap-based buffer overflow on the affected system.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link.
http://www.microsoft.com/technet/security/bulletin/ms09-044.mspx
Insight
- Error exists when processing specific parameters returned by the RDP server, which could be exploited to cause a heap-based buffer overflow by tricking a user into connecting to a malicious RDP server.
- An heap-based buffer overflow error in the Remote Desktop Web Connection ActiveX control when processing malformed parameters, which can be exploited via specially crafted web page.
Affected
Microsoft Windows 2k Service Pack 4 and prior
Microsoft Windows XP Service Pack 3 and prior
Microsoft Windows 2k3 Service Pack 2 and prior
Microsoft Windows Vista Service Pack 1/2 and prior.
Microsoft Windows Server 2008 Service Pack 1/2 and prior.
References
Severity
Classification
-
CVE CVE-2009-1133, CVE-2009-1929 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
- Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
- Host Integration Server RPC Service Remote Code Execution Vulnerability (956695)
- Message Queuing Remote Code Execution Vulnerability (951071) - Remote
- Microsoft Antimalware Client Privilege Elevation Vulnerability (2823482)