Wednesday, August 10, 2011

Vulnerability in Remote Desktop Web Access Could Allow Elevation of Privilege (2546250)

A new important security update has been released for Remote Desktop Web Access, for details see below.

Article ID: 2546250 - Last Review: August 9, 2011 - Revision: 1.0
MS11-061: Vulnerability in Remote Desktop Web Access could allow elevation of privilege: August 9, 2011

Executive SummaryThis security update resolves a privately reported vulnerability in Remote Desktop Web Access. The vulnerability is a cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user. The XSS Filter in Internet Explorer 8 and Internet Explorer 9 prevents this attack for its users when browsing to a Remote Desktop Web Access server in the Internet Zone. The XSS Filter in Internet Explorer 8 and Internet Explorer 9 is not enabled by default in the Intranet Zone.

This security update is rated Important for all supported editions of Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses the vulnerability by correcting the manner in which the logon page for Remote Desktop Web Access validates input parameters. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.

More info:
http://www.microsoft.com/technet/security/bulletin/MS11-061.mspx
http://support.microsoft.com/kb/2546250/en-us?sd=rss&spid=14134

No comments:

Post a Comment