Untrusted search path vulnerability in the client in Remote Desktop Protocol (RDP) through 8.1 in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Protocol DLL Planting Remote Code Execution Vulnerability."
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-06T05:17:27.000Z
Reserved: 2015-03-19T00:00:00
Link: CVE-2015-2473
No data.
Status : Deferred
Published: 2015-08-15T00:59:33.017
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-2473
No data.
OpenCVE Enrichment
No data.
Weaknesses