Počet zobrazení stránky

pondělí 19. března 2012

Addressing the Issue Around the Windows Remote Desktop Protocol Server Flaw (MS012-020)


We’ve gotten a number of questions from customers who are concerned about the Remote Desktop Protocol (RDP) vulnerability addressed by Microsoft on Tuesday with their security bulletin MS012-020. We wanted to take a moment to update you on this.
This bulletin addresses a critical, remote execution vulnerability affecting Microsoft Windows systems that have RDP enabled. While this is not enabled by default on Windows systems, RDP provides remote access functionality that many environments utilize, thus potentially putting them at risk. This vulnerability is highly critical because it can be exploited even by unauthenticated users. Another fact that’s special about this vulnerability is that it affects all versions of Windows. Hence, it’s important to take mitigating steps.
Trend Micro customers who run Deep Security or the Intrusion Defense Firewall (IDF) who have applied the latest updates have protections against attempts to exploit this vulnerability; specifically Deep Security update DSRU12-006 with the rule name 1004949 – Remote Desktop Protocol Vulnerability (CVE-2012-0002) and IDF update 12007) . These updates were released on Tuesday March 13 and Wednesday March 14 , respectively. As a member of the Microsoft Active Protections Program (MAPP), Trend Micro received information from Microsoft as part of their regular security update release process to provide these protections to Trend Micro customers.
As part of their regular security update process, Trend Micro customers should regularly update these products to get the latest protections against exploits for these vulnerabilities.
In accordance with Microsoft’s guidance, Trend Micro customers are encouraged to test and deploy the Microsoft security updates as soon as possible. More detailed information about the vulnerabilities addressed in this security update is available from Microsoft at their Security Research and Defense blog.
Update as of March 16, 2012, 11:58 p.m. (PST)
We wanted to update to make customers aware of reports that there is now Proof-of-Concept code available for MS012-020. Once again we urge customers to test and deploy this update as soon as possible.
We also wanted customers to know that Trend Micro Threat Management Services helps provide protections against attempts to exploit this vulnerability using following TDA patterns:
  • Network Content Inspection Pattern (NCIP) 1.11595
  • Network Content Correlation Pattern (NCCP) 1.11579
Finally, as an additional protection, customers may want to evaluate blocking access RDP (TCP port 3389) or watching for traffic scans and abnormalities on that port.

1 komentář:

  1. Windows remote desktop protocol server was released by Microsoft. It is big advantage. It is widely used in computer systems. It affects all versions of Windows.

    Remote Desktop

    OdpovědětVymazat