Vulnerabilities > CVE-2011-0029 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Untrusted search path vulnerability in the client in Microsoft Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Insecure Library Loading Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 | |
OS | 15 |
Msbulletin
bulletin_id | MS11-017 |
bulletin_url | |
date | 2011-03-08T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2508062 |
knowledgebase_url | |
severity | Important |
title | Vulnerability in Remote Desktop Client Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-017.NASL |
description | The remote host contains a version of the Remote Desktop client that incorrectly restricts the path used for loading external libraries. If an attacker can trick a user on the affected system into opening a specially crafted .rdp file located in the same network directory as a specially crafted dynamic link library (DLL) file, this issue could be leveraged to execute arbitrary code subject to the user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 52585 |
published | 2011-03-08 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/52585 |
title | MS11-017: Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (2508062) |
code |
|
Oval
accepted | 2012-03-26T04:01:53.312-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Untrusted search path vulnerability in the client in Microsoft Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Insecure Library Loading Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:12480 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2011-03-08T14:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Remote Desktop Insecure Library Loading Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 74 |
Saint
bid | 46678 |
description | Microsoft Remote Desktop Connection Insecure Library Injection |
id | win_patch_rdcill |
osvdb | 71014 |
title | microsoft_rdp_dllinject |
type | client |
References
- http://osvdb.org/71014
- http://secunia.com/advisories/43628
- http://www.securitytracker.com/id?1025172
- http://www.us-cert.gov/cas/techalerts/TA11-067A.html
- http://www.vupen.com/english/advisories/2011/0616
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-017
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12480
- http://osvdb.org/71014
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12480
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-017
- http://www.vupen.com/english/advisories/2011/0616
- http://www.us-cert.gov/cas/techalerts/TA11-067A.html
- http://www.securitytracker.com/id?1025172
- http://secunia.com/advisories/43628