Vulnerabilities > CVE-2002-0863 - Unspecified vulnerability in Microsoft products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus

Summary

Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS02-051.NASL
descriptionThe remote host contains a version of the Remote Desktop protocol / service that could allow an attacker to crash the remote service and cause the system to stop responding. Another vulnerability could allow an attacker to disclose information.
last seen2020-06-01
modified2020-06-02
plugin id11146
published2002-10-24
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11146
titleMS02-051: Cryptographic Flaw in RDP Protocol can Lead to Information Disclosure (324380)

Oval

accepted2012-04-16T04:07:56.223-04:00
classvulnerability
contributors
  • nameTiffany Bergeron
    organizationThe MITRE Corporation
  • nameChristine Walzer
    organizationThe MITRE Corporation
  • nameShane Shaffer
    organizationG2, Inc.
  • nameSudhir Gandhe
    organizationTelos
  • nameShane Shaffer
    organizationG2, Inc.
  • nameScott Quint
    organizationDTCC
descriptionRemote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."
familywindows
idoval:org.mitre.oval:def:199
statusaccepted
submitted2003-10-10T12:00:00.000-04:00
titleWeak Encryption in RDP Protocol
version42