全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别会员请立即修改密码
查看: 446|回复: 4
打印 上一主题 下一主题

SECURITY ALERT: Critical Vulnerability in Windows RDP, Patch Now (MS12-020)

[复制链接]
跳转到指定楼层
1#
发表于 2012-3-15 21:18:15 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
Dear Customer,
This is a notice of an active security alert which could pose a threat
to your server with operating system of Microsoft Windows.

Please see the alert below:

"Yesterday, during Microsoft's Patch Tuesday they announced a patch
for a critical vulnerability in Windows Remote Desktop. If exploited,
the vulnerability would allow anyone to remotely run commands on your
server.

This bug affects all versions of Windows (XP - 7/2008 R2)
If you have a server or workstation running RDP please patch it now.
There currently is no known exploit, but Microsoft believes there will
be one in the next 30 days. However, it is very likely there will be
something sooner.

A temporary fix is to enable NLA (Network Layer Authentication). This
would require the attacker to have valid login credentials, however if
successfully exploited the remote commands would run as the SYSTEM
user and not the user authenticated."

The patch is available from Windows Update and there are manual
patches linked below.

http://technet.microsoft.com/en-us/security/bulletin/ms12-020

http://blogs.technet.com/b/srd/archive/2012/03/13/cve-2012-0002-a-closer-look-at-ms12-020-s-critical-issue.aspx



Regards
Thrust::VPS


看不懂 谁给翻译一下
2#
发表于 2012-3-15 21:20:48 | 只看该作者
就是如果你用Windows的话,要你马上打补丁。

还在看??
现在立刻去打!! 
3#
发表于 2012-3-15 21:21:40 | 只看该作者
话说,今天收到了一大堆这种邮件。。。
4#
发表于 2012-3-15 21:22:51 | 只看该作者
鸟文不懂
5#
发表于 2012-3-15 21:44:41 | 只看该作者

鸟文不懂
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2025-11-9 03:02 , Processed in 0.061357 second(s), 9 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表