Multiple Vulnerabilities in Microsoft RDP

Reported September 18, 2002, by Microsoft.



·         Windows XP with Remote Desktop enabled

·         Windows 2000 Server Terminal Services




Two vulnerabilities exist in Microsoft RDP. The first vulnerability is an information-disclosure vulnerability that forwards unencrypted checksums of plaintext data under XP and Win2K. An attacker can use these checksums to conduct a cryptanalytic attack to recover session traffic. The second vulnerability is a Denial of Service (DoS) condition in XP’s Remote Desktop service when this service uses RDP. By sending specially malformed packets to the service (which by default runs on TCP port 3389), an attacker can crash the vulnerable system.




The vendor, Microsoft, has released Security Bulletin MS02-051 (Cryptographic Flaw in RDP Protocol can Lead to Information Disclosure) to address these vulnerabilities, and recommends that affected users apply the appropriate patch mentioned in the bulletin.



Discovered by Microsoft.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.