Critical Windows Vulnerability with Remote Desktop

Recently Microsoft released a patch for a critical bug in RDP (Remote Desktop) that may allow an unauthenticated attacker to take control to remote Windows system. This vulnerability in Remote Desktop (MS12-020) could allow Remote Code execution allowing system penetration.It rated Critical for all supported releases of Microsoft Windows.

All windows servers with automatic updates enabled should have received the patch at March 13th 2012, but if your system has the automatic updates turned off, the issue still persist.
With the bellow commands executed in command prompt you can check if the security patch is applied already:

The security update addresses the vulnerabilities by modifying the way that the Remote Desktop Protocol processes packets in memory and the way that the RDP service processes packets.

Here is maybe the point where I will say that if you change Windows Remote Desktop Port number will increase your security level – at least when the system is scanned with automated bot looking for the default 3389 port.

More information can be found at Microsoft Security Bulletin page for MS12-020:
http://technet.microsoft.com/en-us/security/bulletin/ms12-020

Filed Under: Articles

Anthony Gee About the Author: Anthony G. is an IT specialist with more than 9 years of solid working experience in the Web Hosting industry. Currently works as server support administrator, involved in consultative discussions about Web Hosting and server administration. One of the first writers in the Onlinehowto.net website, now writing for Free Tutorials community - he is publishing tutorials and articles for the wide public, as well as specific technical solutions.

Leave a Reply