Untrusted search path vulnerability in the client in Microsoft Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Insecure Library Loading Vulnerability." Per: http://www.microsoft.com/technet/security/Bulletin/MS11-017.mspx
'For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open an .rdp file.'
FAQ: 'This is a remote code execution vulnerability.' Per: http://cwe.mitre.org/data/definitions/426.html
'CWE-426: Untrusted Search Path'