Schweregrad: : Alto
  Identificador(es) CVE: : CVE-2011-1968
  Data do informe: 16 agosto 2011

  Descrição

This security update resolves a privately reported vulnerability in the Remote Desktop Protocol (RDP). The vulnerability could allow denial of service if an affected system received a sequence of specially crafted RDP packets. Microsoft also received reports of limited, targeted attacks attempting to exploit this vulnerability. By default, the RDP is not enabled on any Windows operating system. The security update addresses the vulnerability by addressing the way that the RDP processes packets in memory.

  Exposição das informações

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  Solução

  Software infectado e versão:

  • Windows XP Service Pack 3
  • Windows XP Professional x64 Edition Service Pack 2
  • Windows Server 2003 Service Pack 2
  • Windows Server 2003 x64 Edition Service Pack 2
  • Windows Server 2003 with SP2 for Itanium-based Systems