When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

MS02-051: Cryptographic Flaw in RDP Protocol (Q324380)

Thanks wired57 for making a thread about this in our forum. The Remote Data Protocol (RDP) provides the means by which Windows systems can provide remote terminal sessions to clients. The protocol transmits information regarding a terminal sessions' keyboard, mouse and video to the remote client, and is used by Terminal Services in Windows NT 4.0 and Windows 2000, and by Remote Desktop in Windows XP. Two security vulnerabilities, both of which are eliminated by this patch, have been discovered in various RDP implementations.

The first involves how session encryption is implemented in certain versions of RDP. All RDP implementations allow the data in an RDP session to be encrypted. However, in the versions in Windows 2000 and Windows XP, the checksums of the plaintext session data are sent without being encrypted themselves. An attacker who was able to eavesdrop on and record an RDP session could conduct a straight-forward cryptanalytic attack against the checksums and recover the session traffic.

The second involves how the RDP implementation in Windows XP handles data packets that are malformed in a particular way. Upon receiving such packets, the Remote Desktop service would fail, and with it would fail the operating system. It would not be necessary for an attacker to authenticate to an affected system in order to deliver packets of this type to an affected system.

    Released: 18 September 2002

    Software: Microsoft Windows 2000, Microsoft Windows XP

    Impact: Two vulnerabilities: information disclosure, denial of service

    Max Risk: Moderate

Download: Patch for Windows 2000

Download: Patch for Windows XP

Download: Patch for Windows XP 64 bit

View: Microsoft Technet - Security Bulletin ID MS02-051

Report a problem with article
Next Article

SOF 1.02 Patch coming soon.

Previous Article

MS02-052: Flaw in Microsoft VM (Q329077)

Join the conversation!

Login or Sign Up to read and post a comment.

-1 Comments - Add comment