#HighriskAlert# Urgent notice about the remote code execution vulnerability (CVE-2019-0708) in Microsoft (Windwos) Remote Desktop Service

888u

Last update at :2024-01-16,Edit by888u

#HighriskAlert#Urgent notice about Microsoft (Windwos) Remote Desktop Service remote code execution vulnerability (CVE-2019-0708)

Vulnerability details

On May 14, 2019, Microsoft announced the May patch update list, which contains an RDP (Remote Desktop Services) remote code execution vulnerability marked as critical. Attackers can exploit this vulnerability without user authentication. Send specially constructed malicious data to execute malicious code on the target system, thereby gaining complete control of the machine.

The devices mainly affected by this vulnerability are Windows 7, Window Server 2008, and Windows 2003 and Window XP operating systems that are no longer supported by Microsoft. The systems involved are still used by a large number of users in mainland China, so the impact of this vulnerability is huge. . Since this vulnerability does not require user interaction, it means that this vulnerability is very likely to be exploited by worms, which may eventually lead to the proliferation of WannCry worms.

Vulnerability summary

Vulnerability name: Microsoft Windows Remote Desktop Services remote code execution vulnerability

Threat Type: Remote Code Execution

Threat Level: Severe

Vulnerability ID: CVE-2019-0708

Affected system versions

Windows 7 for 32-bit Systems Service Pack 1

Windows 7 for x64-based Systems Service Pack 1

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for Itanium-Based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

For users who use cloud servers, we recommend that you refer to the following protection solutions

1. Install the patch in time. After installation, you need to restart to take effect. Microsoft official download link is as follows

Windows 2008 R2:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

Windows 2003:

https://support.microsoft.com/zh-cn/help/4500705/customer-guidance-for-cve-2019-0708

2. Only trusted IPs are allowed to remotely connect to the server.

3. You can use other remote management solutions to replace the remote desktop service or disable the remote desktop server and use VNC management

Recommended site searches: personal free space, free IP address in mainland China, US vps server, registration-free space in mainland China, buying space network, telecom host rental, registration, free server website overseas server rental price, free host,

#HighriskAlert# Urgent notice about the remote code execution vulnerability (CVE-2019-0708) in Microsoft (Windwos) Remote Desktop Service

All copyrights belong to 888u unless special state
取消
微信二维码
微信二维码
支付宝二维码