First published: Fri Oct 11 2002(Updated: )
The Remote Data Protocol (RDP) version 5.1 in Microsoft Windows XP allows remote attackers to cause a denial of service (crash) when Remote Desktop is enabled via a PDU Confirm Active data packet that does not set the Pattern BLT command, aka "Denial of Service in Remote Desktop."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =beta3 | |
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows 2000 | =sp3 | |
Microsoft Windows Terminal Services | ||
Microsoft Windows Terminal Services | =sp1 | |
Microsoft Windows Terminal Services | =sp2 | |
Microsoft Windows Terminal Services | =sp3 | |
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | =gold | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0864 has a high severity as it can result in a denial of service when Remote Desktop is enabled.
To fix CVE-2002-0864, ensure that all relevant Microsoft Windows updates and patches are applied.
CVE-2002-0864 affects Microsoft Windows XP, Windows 2000, and related Terminal Services.
CVE-2002-0864 is a denial of service vulnerability in Microsoft's Remote Data Protocol (RDP).
Yes, CVE-2002-0864 can be exploited remotely by attackers if Remote Desktop is enabled.