First published: Wed Aug 12 2009(Updated: )
Heap-based buffer overflow in Microsoft Remote Desktop Connection (formerly Terminal Services Client) running RDP 5.0 through 6.1 on Windows, and Remote Desktop Connection Client for Mac 2.0, allows remote attackers to execute arbitrary code via unspecified parameters, aka "Remote Desktop Connection Heap Overflow Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server 2008 | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Server 2008 | =sp2 | |
Microsoft Windows Server 2008 | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Server 2008 | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.