Overview
Microsoft Windows Remote Desktop Protocol (RDP) uses a weak algorithm for encrypting packets.
Description
Microsoft describes RDP as follows. RDP is based on, and is an extension of, the T.120 protocol family standards. It is a multichannel-capable protocol that allows for separate virtual channels for carrying device communication and presentation data from the server, as well as encrypted client mouse and keyboard data. |
Impact
A remote attacker could apply cryptanalytic techniques to recover encrypted session traffic. |
Solution
Apply a patch. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-051.asp
- http://msdn.microsoft.com/library/en-us/termserv/termserv/using_terminal_services_virtual_channels.asp
- http://www.microsoft.com/windows2000/techinfo/howitworks/terminal/rdpfandp.asp
- http://link.springer.de/link/service/series/0558/bibs/2139/21390310.htm
- http://www.ietf.org/rfc/rfc2104.txt
Acknowledgements
Ben Cohen & Pete Chown of Skygate Technology Ltd. discovered this vulnerability.
This document was written by Ian A Finlay.
Other Information
CVE IDs: | CVE-2002-0863 |
Severity Metric: | 6.30 |
Date Public: | 2002-09-18 |
Date First Published: | 2002-12-06 |
Date Last Updated: | 2002-12-06 18:57 UTC |
Document Revision: | 16 |