This CPE summary could be partial or incomplete. Please contact us for a detailed listing.


Vendor Microsoft First view 2009-08-12
Product Windows Server Last view 2009-08-12
Version 2003 Type Os
Update sp2  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
CPE Product cpe:2.3:o:microsoft:windows_server

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2009-08-12 CVE-2009-1133

Heap-based buffer overflow in Microsoft Remote Desktop Connection (formerly Terminal Services Client) running RDP 5.0 through 6.1 on Windows, and Remote Desktop Connection Client for Mac 2.0, allows remote attackers to execute arbitrary code via unspecified parameters, aka "Remote Desktop Connection Heap Overflow Vulnerability."

CWE : Common Weakness Enumeration

100% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Open Source Vulnerability Database (OSVDB)

id Description
56911 Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow

OpenVAS Exploits

id Description
2009-08-12 Name : Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
File : nvt/secpod_ms09-044.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2009-A-0071 Multiple Vulnerabilities in Microsoft Remote Desktop Connection
Severity: Category II - VMSKEY: V0019884

Snort® IPS/IDS

Date Description
2014-01-10 Remote Desktop orderType remote code execution attempt
RuleID : 15850 - Type : OS-WINDOWS - Revision : 13

Nessus® Vulnerability Scanner

id Description
2009-08-11 Name: Arbitrary code can be executed on the remote host through Microsoft Remote De...
File: macosx_rdesktop.nasl - Type: ACT_GATHER_INFO
2009-08-11 Name: It is possible to execute arbitrary code on the remote host.
File: smb_nt_ms09-044.nasl - Type: ACT_GATHER_INFO