CVE-2011-0029

Published Mar 9, 2011

Last updated a month ago

Overview

Description
Untrusted search path vulnerability in the client in Microsoft Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Insecure Library Loading Vulnerability."
Source
secure@microsoft.com
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.4
Impact score
5.9
Exploitability score
1.4
Vector string
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
9.3
Impact score
10
Exploitability score
8.6
Vector string
AV:N/AC:M/Au:N/C:C/I:C/A:C

Weaknesses

nvd@nist.gov
NVD-CWE-Other

Evaluator

Comment
Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'
Impact
Per: http://www.microsoft.com/technet/security/Bulletin/MS11-017.mspx 'For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open an .rdp file.' FAQ: 'This is a remote code execution vulnerability.'
Solution
Per: http://www.microsoft.com/technet/security/Bulletin/MS11-017.mspx 'For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open an .rdp file.' FAQ: 'This is a remote code execution vulnerability.'

Configurations