Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Remote Desktop Connection Client ActiveX code execution
Published:12.04.2013
Source:
SecurityVulns ID:13003
Type:client
Threat Level:
7/10
Description:Use-after-free in ActiveX
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2013-1296 (The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection Client 6.1 and 7.0 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a web page that triggers access to a deleted object, and allows remote RDP servers to execute arbitrary code via unspecified vectors that trigger access to a deleted object, aka "RDP ActiveX Control Remote Code Execution Vulnerability.")
Files:Microsoft Security Bulletin MS13-029 - Critical Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod