CERTA-2005-AVI-304
Vulnerability from certfr_avis
Une vulnérabilité dans Remote Desktop Protocol permet de réaliser un déni de service.
Description
Le protocole RDP (Remote Desktop Protocol) permet à un utilisateur d'établir une session virtuelle graphique vers une autre machine.
Un utilisateur mal intentionné peut, par le biais d'un message RDP malicieusement constitué, provoquer un arrêt du système vulnérable.
Contournement provisoire
Filtrer le port 3389/tcp au niveau du pare-feu.
Solution
Appliquer le correctif tel qu'indiqué dans le bulletin de sécurité Microsoft MS05-041 (voir Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Microsoft Windows XP Professional x64 Edition ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 et Microsoft Windows Server 2003 Service Pack 1 ; | ||
| Microsoft | Windows | Microsoft Windows XP Service Pack 1 et Service Pack 2 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 x64 Edition. | ||
| Microsoft | Windows | Microsoft Windows 2000 Server Service Pack 4 ; | ||
| Microsoft | Windows | Microsoft Windows Server 2003 pour systèmes Itanium et Microsoft Windows Server 2003 pour systèmes Itanium Service Pack 1 ; |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Windows XP Professional x64 Edition ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 et Microsoft Windows Server 2003 Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows XP Service Pack 1 et Service Pack 2 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 x64 Edition.",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows 2000 Server Service Pack 4 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Windows Server 2003 pour syst\u00e8mes Itanium et Microsoft Windows Server 2003 pour syst\u00e8mes Itanium Service Pack 1 ;",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLe protocole RDP (Remote Desktop Protocol) permet \u00e0 un utilisateur\nd\u0027\u00e9tablir une session virtuelle graphique vers une autre machine.\n\nUn utilisateur mal intentionn\u00e9 peut, par le biais d\u0027un message RDP\nmalicieusement constitu\u00e9, provoquer un arr\u00eat du syst\u00e8me vuln\u00e9rable.\n\n## Contournement provisoire\n\nFiltrer le port 3389/tcp au niveau du pare-feu.\n\n## Solution\n\nAppliquer le correctif tel qu\u0027indiqu\u00e9 dans le bulletin de s\u00e9curit\u00e9\nMicrosoft MS05-041 (voir Documentation).\n",
"cves": [],
"initial_release_date": "2005-08-10T00:00:00",
"last_revision_date": "2005-08-10T00:00:00",
"links": [],
"reference": "CERTA-2005-AVI-304",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-08-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Remote Desktop Protocol permet de r\u00e9aliser un\nd\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 du protocole RDP de Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS05-041 du 09 ao\u00fbt 2005",
"url": "http://www.microsoft.com/technet/security/bulletin/MS05-041.mspx"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…