Desktops and servers using various Microsoft Windows operating systems are vulnerable to attacks using the Remote Desktop Protocol. The Remote Desktop Protocol allows users to remotely control machines running Microsoft Windows operating systems. This vulnerability could allow unauthorized remote code execution if a remote attacker sends specially crafted network packets to a computer that has RDP enabled at TCP port 3389.
There are reports indicating the emergence of proof of concept code in the wild. Trend Micro is able to provide solutions against PoC code related to this vulnerability.
Users of Trend Micro PC-cillin Internet Security and Network VirusWall can detect this exploit at the network layer with Network Virus Pattern (NVP) 10314 or later.
Download the latest NVW pattern file from the following site:
Users of Threat Discovery Appliance can detect this exploit at the network layer with NCIP PATTERN 1.11597.00 and NCCP PATTERN 1.11581.00 or later.
|TDA Pattern||TDA Release Date||NVP Pattern Number||NVP Release Date||Ti5 Pattern Number||Ti5 Release Date|
|NCIP PATTERN 1.11597.00 and NCCP PATTERN 1.11581.00||March 20, 2012||������ 110314||March 20, 2012||Ti5 RR 1.10021.00 and NVP 1.10021.00||March 20, 2012|
You may download the TDA pattern automatically in the TDA User Interface.