How to Buy
This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
Arbitrary code can be executed on the remote host through Microsoft
Remote Desktop Connection.
The remote host contains a version of the Remote Desktop client that
contains several vulnerabilities that may allow an attacker to execute
arbitrary code on the remote host.
To exploit these vulnerabilities, an attacker would need to trick a
user of the remote host into connecting to a rogue RDP server.
See also :
Microsoft has released a patch for Remote Desktop Client for Mac OS X.
Risk factor :
High / CVSS Base Score : 7.6
CVSS Temporal Score : 5.6
Public Exploit Available : false
Family: MacOS X Local Security Checks
Nessus Plugin ID: 40563 (macosx_rdesktop.nasl)
Bugtraq ID: 3597135973
CVE ID: CVE-2009-1133CVE-2009-1929
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.