Rapid7 Vulnerability & Exploit Database

MS13-029: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)

Back to Search

MS13-029: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
04/09/2013
Created
07/25/2018
Added
04/09/2013
Modified
10/15/2015

Description

This security update resolves a privately reported vulnerability in Windows Remote Desktop Client. The vulnerability could allow remote code execution if a user views a specially crafted webpage. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Solution(s)

  • WINDOWS-HOTFIX-MS13-029-0bb4f7a0-a492-49ca-84ed-dd9637a32e21
  • WINDOWS-HOTFIX-MS13-029-6c1ff28a-efd8-4fd4-80a6-23d9892256fe
  • WINDOWS-HOTFIX-MS13-029-7539127a-a017-4961-8459-9f94598ee616
  • WINDOWS-HOTFIX-MS13-029-7621bfea-22f8-4dd5-93ed-6313d032dae4
  • WINDOWS-HOTFIX-MS13-029-7757422-legacy
  • WINDOWS-HOTFIX-MS13-029-8bc360be-2a9d-4b53-9dfe-3796b06f9648
  • WINDOWS-HOTFIX-MS13-029-8cab871b-6c86-4091-a9c7-8ce1392f34f0
  • WINDOWS-HOTFIX-MS13-029-be25d015-b5ad-4fdc-a380-e6274d0502da
  • WINDOWS-HOTFIX-MS13-029-c4bb325a-2aa2-4e8f-836e-596531b7e563
  • WINDOWS-HOTFIX-MS13-029-d2816760-28f1-4e79-9c03-fbb4632be16b
  • WINDOWS-HOTFIX-MS13-029-d612b315-e90c-492a-b7ee-bd61aa6f3e0c
  • WINDOWS-HOTFIX-MS13-029-d8af2498-875d-42c0-91e0-1cd57ef62dee
  • WINDOWS-HOTFIX-MS13-029-daf205e1-857d-4cec-9e13-87ad298f9efd
  • WINDOWS-HOTFIX-MS13-029-dd7619dd-d6a6-4765-8406-612fd79583ba
  • WINDOWS-HOTFIX-MS13-029-e31f669c-cc33-40a3-954c-47bd3c6fa68e
  • WINDOWS-HOTFIX-MS13-029-e455a882-f8cc-4d00-a07c-a002e35f12bf
  • WINDOWS-HOTFIX-MS13-029-f001b730-4ea9-41be-9052-ce147bb5fca7
  • WINDOWS-HOTFIX-MS13-029-f2826b69-40c5-4029-b47d-d280509f1a34
  • WINDOWS-HOTFIX-MS13-029-f59152e4-c784-4039-8d41-d50dab56dcdc

References

  • WINDOWS-HOTFIX-MS13-029-0bb4f7a0-a492-49ca-84ed-dd9637a32e21
  • WINDOWS-HOTFIX-MS13-029-6c1ff28a-efd8-4fd4-80a6-23d9892256fe
  • WINDOWS-HOTFIX-MS13-029-7539127a-a017-4961-8459-9f94598ee616
  • WINDOWS-HOTFIX-MS13-029-7621bfea-22f8-4dd5-93ed-6313d032dae4
  • WINDOWS-HOTFIX-MS13-029-7757422-legacy
  • WINDOWS-HOTFIX-MS13-029-8bc360be-2a9d-4b53-9dfe-3796b06f9648
  • WINDOWS-HOTFIX-MS13-029-8cab871b-6c86-4091-a9c7-8ce1392f34f0
  • WINDOWS-HOTFIX-MS13-029-be25d015-b5ad-4fdc-a380-e6274d0502da
  • WINDOWS-HOTFIX-MS13-029-c4bb325a-2aa2-4e8f-836e-596531b7e563
  • WINDOWS-HOTFIX-MS13-029-d2816760-28f1-4e79-9c03-fbb4632be16b
  • WINDOWS-HOTFIX-MS13-029-d612b315-e90c-492a-b7ee-bd61aa6f3e0c
  • WINDOWS-HOTFIX-MS13-029-d8af2498-875d-42c0-91e0-1cd57ef62dee
  • WINDOWS-HOTFIX-MS13-029-daf205e1-857d-4cec-9e13-87ad298f9efd
  • WINDOWS-HOTFIX-MS13-029-dd7619dd-d6a6-4765-8406-612fd79583ba
  • WINDOWS-HOTFIX-MS13-029-e31f669c-cc33-40a3-954c-47bd3c6fa68e
  • WINDOWS-HOTFIX-MS13-029-e455a882-f8cc-4d00-a07c-a002e35f12bf
  • WINDOWS-HOTFIX-MS13-029-f001b730-4ea9-41be-9052-ce147bb5fca7
  • WINDOWS-HOTFIX-MS13-029-f2826b69-40c5-4029-b47d-d280509f1a34
  • WINDOWS-HOTFIX-MS13-029-f59152e4-c784-4039-8d41-d50dab56dcdc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;