Vulnerabilities > CVE-2015-2473 - Unspecified vulnerability in Microsoft Windows 7 and Windows Server 2008

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus

Summary

Untrusted search path vulnerability in the client in Remote Desktop Protocol (RDP) through 8.1 in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Protocol DLL Planting Remote Code Execution Vulnerability."

Vulnerable Configurations

Part Description Count
OS
Microsoft
3

Msbulletin

bulletin_idMS15-082
bulletin_url
date2015-08-11T00:00:00
impactRemote Code Execution
knowledgebase_id3080348
knowledgebase_url
severityImportant
titleVulnerabilities in RDP Could Allow Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS15-082.NASL
descriptionThe remote Windows host is missing a security update. It is, therefore affected by the following vulnerabilities : - A spoofing vulnerability exists due to the Remote Desktop Session Host (RDSH) not properly validating certificates during authentication. An man-in-the-middle attacker can exploit this to impersonate a client session by spoofing a TLS/SSL server via a certificate that appears valid. (CVE-2015-2472) - A code execution vulnerability exists due to the Remote Desktop Protocol client not properly handling the loading of certain specially crafted DLL files. An attacker, by placing a malicious DLL in the user
last seen2020-06-01
modified2020-06-02
plugin id85332
published2015-08-11
reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/85332
titleMS15-082: Vulnerability in RDP Could Allow Remote Code Execution (3080348)