CVE-2019-0708
Assigned by [email protected]
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Weaknesses (CWE)
CWE-416 — Use After Free
Chain: A multi-threaded race condition (CWE-367) allows attackers to cause two threads to process the same RPC request, which causes a use-after-free (CWE-416) in one threadChain: A multi-threaded race condition (CWE-367) allows attackers to cause two threads to process the same RPC request, which causes a use-after-free (CWE-416) in one thread
CVSS
9.8
Base Score: 9.8/10 HIGH
Exploitability: 3.9/10
Impact: 5.9/10
Access Vector
- Availability: HIGH
- Confidentiality: HIGH
- Integrity: HIGH
Impact
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Attack Patterns (CAPEC)
References
http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html
http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html
http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html
http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html
http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en
http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en
https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html
http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html
http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html
http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html
http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en
http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en
https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-0708
