A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.
The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.
The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Microsoft
Subscribe
|
Remote Desktop
Subscribe
Windows 10
Subscribe
Windows 10 1507
Subscribe
Windows 10 1607
Subscribe
Windows 10 1803
Subscribe
Windows 10 1809
Subscribe
Windows 7
Subscribe
Windows 8.1
Subscribe
Windows Rt 8.1
Subscribe
Windows Server 1803
Subscribe
Windows Server 1903
Subscribe
Windows Server 2008
Subscribe
Windows Server 2012
Subscribe
Windows Server 2012 R2
Subscribe
Windows Server 2016
Subscribe
Windows Server 2019
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-04T18:13:29.299Z
Reserved: 2018-11-26T00:00:00
Link: CVE-2019-1181
Updated: 2024-08-04T18:13:29.299Z
Status : Modified
Published: 2019-08-14T21:15:16.737
Modified: 2024-11-21T04:36:11.587
Link: CVE-2019-1181
No data.
OpenCVE Enrichment
No data.
Weaknesses