The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly process packets in memory, which allows remote attackers to cause a denial of service (reboot) by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, as exploited in the wild in 2011, aka "Remote Desktop Protocol Vulnerability."
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2011-08-10T21:16:00
Updated: 2018-10-12T19:57:01
Reserved: 2011-05-09T00:00:00
Link: CVE-2011-1968
JSON object: View
NVD Information
Status : Modified
Published: 2011-08-10T21:55:01.767
Modified: 2019-02-26T14:04:00.993
Link: CVE-2011-1968
JSON object: View
Redhat Information
No data.
CWE