Risk report for MS12-020

On March 20, 2012, in Security, by

Today’s risk report for MS12-020:

There’s a Metasploit module out today that has at this time a Denial of Service impact.  We  have not yet seen a Remote code exploit at this time.

But clock is still ticking.

=====================

Metasploit :: Browse Exploit & Auxiliary Modules:
http://www.metasploit.com/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids
This module exploits the MS12-002 RDP vulnerability originally discovered and reported by Luigi Auriemma. The flaw can be found in the way the T.125 ConnectMCSPDU packet is handled in the maxChannelIDs field, which will result an invalid pointer being used, therefore causing a denial-of-service condition.

 

3 Responses to Risk report for MS12-020

  1. Chuck says:

    So the question begs to be asked. Are we safe( servers and workstations) if we applied the security patch or do we need to disable RDP?

  2. bradley says:

    If you patched, you are safe.

  3. Chuck says:

    Thank you. That’s what I thought but it never hurts to ask.73431