First published: Wed Aug 12 2009(Updated: )
Heap-based buffer overflow in Microsoft Remote Desktop Connection (formerly Terminal Services Client) running RDP 5.0 through 6.1 on Windows, and Remote Desktop Connection Client for Mac 2.0, allows remote attackers to execute arbitrary code via unspecified parameters, aka "Remote Desktop Connection Heap Overflow Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1133 has a critical severity level due to its potential to allow remote code execution.
To fix CVE-2009-1133, you should apply the latest security updates provided by Microsoft for the affected software.
CVE-2009-1133 affects Microsoft Windows versions including Windows 2000, Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008.
Yes, CVE-2009-1133 can be exploited remotely by attackers to execute arbitrary code on the affected systems.
While the definitive fix is to apply security updates, limiting access to the Remote Desktop service can serve as an interim workaround for CVE-2009-1133.