Vulnerabilities > CVE-2002-0863 - Unspecified vulnerability in Microsoft products

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
microsoft
nessus

Summary

Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS02-051.NASL
descriptionThe remote host contains a version of the Remote Desktop protocol / service that could allow an attacker to crash the remote service and cause the system to stop responding. Another vulnerability could allow an attacker to disclose information.
last seen2020-06-01
modified2020-06-02
plugin id11146
published2002-10-24
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11146
titleMS02-051: Cryptographic Flaw in RDP Protocol can Lead to Information Disclosure (324380)

Oval

accepted2012-04-16T04:07:56.223-04:00
classvulnerability
contributors
  • nameTiffany Bergeron
    organizationThe MITRE Corporation
  • nameChristine Walzer
    organizationThe MITRE Corporation
  • nameShane Shaffer
    organizationG2, Inc.
  • nameSudhir Gandhe
    organizationTelos
  • nameShane Shaffer
    organizationG2, Inc.
  • nameScott Quint
    organizationDTCC
descriptionRemote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."
familywindows
idoval:org.mitre.oval:def:199
statusaccepted
submitted2003-10-10T12:00:00.000-04:00
titleWeak Encryption in RDP Protocol
version42