Vulnerability Name: | CVE-2011-1968 (CCN-68830) | ||||||||
Assigned: | 2011-08-09 | ||||||||
Published: | 2011-08-09 | ||||||||
Updated: | 2019-02-26 | ||||||||
Summary: | The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly process packets in memory, which allows remote attackers to cause a denial of service (reboot) by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, as exploited in the wild in 2011, aka "Remote Desktop Protocol Vulnerability." | ||||||||
CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-399 | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: MITRE Type: CNA CVE-2011-1968 Source: CCN Type: SA45562 Microsoft Windows Remote Desktop Protocol Denial of Service Vulnerability Source: CCN Type: Microsoft Security Bulletin MS12-020 Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387) Source: CCN Type: Microsoft Security Bulletin MS12-036 Vulnerability in Remote Desktop Could Allow Remote Code Execution (2685939) Source: CCN Type: Microsoft Security Bulletin MS12-053 Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135) Source: CCN Type: Microsoft Security Bulletin MS11-065 Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (2570222) Source: CCN Type: BID-48995 Microsoft Remote Desktop Protocol CVE-2011-1968 Denial of Service Vulnerability Source: CERT Type: US Government Resource TA11-221A Source: MS Type: UNKNOWN MS11-065 Source: XF Type: UNKNOWN ms-win-rdp-dos(68830) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:12806 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |