Rapid7 VulnDB

MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (2570222)

Back to Search

MS11-065: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (2570222)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
08/10/2011
Created
07/25/2018
Added
08/10/2011
Modified
06/26/2015

Description

This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow denial of service if an affected system received a sequence of specially crafted RDP packets. Microsoft has also received reports of limited, targeted attacks attempting to exploit this vulnerability. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system.

Solution(s)

  • WINDOWS-HOTFIX-MS11-065-6b5d3021-cb2d-4079-ba73-1be23df21ac1
  • WINDOWS-HOTFIX-MS11-065-932d0638-2bd1-4981-b45a-74115df91154
  • WINDOWS-HOTFIX-MS11-065-bc650c75-d11a-4b8e-9cb8-b505335a5d95
  • WINDOWS-HOTFIX-MS11-065-ed4e2f6c-1316-44a2-aed7-50d78784a3d7
  • WINDOWS-HOTFIX-MS11-065-fd988e83-1966-41da-9ca8-3ab5391d1e1c

References

  • WINDOWS-HOTFIX-MS11-065-6b5d3021-cb2d-4079-ba73-1be23df21ac1
  • WINDOWS-HOTFIX-MS11-065-932d0638-2bd1-4981-b45a-74115df91154
  • WINDOWS-HOTFIX-MS11-065-bc650c75-d11a-4b8e-9cb8-b505335a5d95
  • WINDOWS-HOTFIX-MS11-065-ed4e2f6c-1316-44a2-aed7-50d78784a3d7
  • WINDOWS-HOTFIX-MS11-065-fd988e83-1966-41da-9ca8-3ab5391d1e1c

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;