The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS02-151: Cryptographic Flaw in RDP Protocol can Lead to Information Disclosure (Q324380)
Time: 08:05 EST/13:05 GMT | News Source: ActiveWin.com | Posted By: Todd Richardson

The first involves how session encryption is implemented in certain versions of RDP. All RDP implementations allow the data in an RDP session to be encrypted. However, in the versions in Windows 2000 and Windows XP, the checksums of the plaintext session data are sent without being encrypted themselves. An attacker who was able to eavesdrop on and record an RDP session could conduct a straightforward cryptanalytic attack against the checksums and recover the session traffic.

The second involves how the RDP implementation in Windows XP handles data packets that are malformed in a particular way. Upon receiving such packets, the Remote Desktop service would fail, and with it would fail the operating system. It would not be necessary for an attacker to authenticate to an affected system in order to deliver packets of this type to an affected system.

Write Comment
Return to News

  Displaying 676 through 676 of 676
Prev | First
  The time now is 6:18:16 PM ET.
Any comment problems? E-mail us
#676 By 4240821 (82.115.4.230) at 11/6/2025 3:24:42 PM
https://sexonly.su/activffca25cccc
https://sexonly.su/activ2f51b2hagc
https://lustful.su/activcddb32454a
https://sluts.su/activbahfah2c3h
https://smutty.su/activ21eehch23d
https://sexonly.su/activ1b22hccbda
https://lustful.su/activbdebb13ghh
https://sexonly.top/activafd4fh54h1
https://sexonly.su/activbcbhf5e334
https://smutty.su/activeh52ggdcc4

Write Comment
Return to News
  Displaying 676 through 676 of 676
Prev | First
  The time now is 6:18:16 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *