Last update at :2024-01-16,Edit by888u
#HighriskAlert#Urgent notice about Microsoft (Windwos) Remote Desktop Service remote code execution vulnerability (CVE-2019-0708)
Vulnerability details
On May 14, 2019, Microsoft announced the May patch update list, which contains an RDP (Remote Desktop Services) remote code execution vulnerability marked as critical. Attackers can exploit this vulnerability without user authentication. Send specially constructed malicious data to execute malicious code on the target system, thereby gaining complete control of the machine.
The devices mainly affected by this vulnerability are Windows 7, Window Server 2008, and Windows 2003 and Window XP operating systems that are no longer supported by Microsoft. The systems involved are still used by a large number of users in mainland China, so the impact of this vulnerability is huge. . Since this vulnerability does not require user interaction, it means that this vulnerability is very likely to be exploited by worms, which may eventually lead to the proliferation of WannCry worms.
Vulnerability summary
Vulnerability name: Microsoft Windows Remote Desktop Services remote code execution vulnerability
Threat Type: Remote Code Execution
Threat Level: Severe
Vulnerability ID: CVE-2019-0708
Affected system versions
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
For users who use cloud servers, we recommend that you refer to the following protection solutions
1. Install the patch in time. After installation, you need to restart to take effect. Microsoft official download link is as follows
Windows 2008 R2:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
Windows 2003:
https://support.microsoft.com/zh-cn/help/4500705/customer-guidance-for-cve-2019-0708
2. Only trusted IPs are allowed to remotely connect to the server.
3. You can use other remote management solutions to replace the remote desktop service or disable the remote desktop server and use VNC management
Recommended site searches: personal free space, free IP address in mainland China, US vps server, registration-free space in mainland China, buying space network, telecom host rental, registration, free server website overseas server rental price, free host,
发表评论