4 results (0.012 seconds)

CVSS: 10.0EPSS: 97%CPEs: 139EXPL: 43

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. Existe una vulnerabilidad de ejecución remota de código en Remote Desktop Services, anteriormente conocido como Terminal Services, cuando un atacante no autenticado se conecta al sistema de destino mediante RDP y envía peticiones especialmente diseñadas, conocida como 'Remote Desktop Services Remote Code Execution Vulnerability'. The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause a use-after-free. With a controllable data/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution. Microsoft Remote Desktop Services, formerly known as Terminal Service, contains an unspecified vulnerability that allows an unauthenticated attacker to connect to the target system using RDP and send specially crafted requests. • https://www.exploit-db.com/exploits/47120 https://www.exploit-db.com/exploits/46946 https://www.exploit-db.com/exploits/47416 https://www.exploit-db.com/exploits/47683 https://github.com/k8gege/CVE-2019-0708 https://github.com/n1xbyte/CVE-2019-0708 https://github.com/victor0013/CVE-2019-0708 https://github.com/cbwang505/CVE-2019-0708-EXP-Windows https://github.com/Leoid/CVE-2019-0708 https://github.com/p0p0p0/CVE-2019-0708-exploit https://github.com/worawit • CWE-416: Use After Free •

CVSS: 7.1EPSS: 0%CPEs: 20EXPL: 0

Huawei FusionServer rack servers RH2288 V3 with software before V100R003C00SPC603, RH2288H V3 with software before V100R003C00SPC503, XH628 V3 with software before V100R003C00SPC602, RH1288 V3 with software before V100R003C00SPC602, RH2288A V2 with software before V100R002C00SPC701, RH1288A V2 with software before V100R002C00SPC502, RH8100 V3 with software before V100R003C00SPC110, CH222 V3 with software before V100R001C00SPC161, CH220 V3 with software before V100R001C00SPC161, and CH121 V3 with software before V100R001C00SPC161 allow remote authenticated operators to change server information by leveraging failure to verify user permissions. Los servidores en rack FusionServer RH2288 V3 con software anterior a V100R003C00SPC603, RH2288H V3 anterior a V100R003C00SPC503, XH628 V3 anterior a V100R003C00SPC602, RH1288 V3 anterior a V100R003C00SPC602, RH2288A V2 anterior a V100R002C00SPC701, RH1288A V2 anterior a V100R002C00SPC502, RH8100 V3 anterior a V100R003C00SPC110, CH222 V3 anterior a V100R001C00SPC161, CH220 V3 anterior a V100R001C00SPC161 y CH121 V3 anterior a V100R001C00SPC161 de Huawei permiten que operadores remotos autenticados cambien información del servidor aprovechando un fallo para verificar permisos del usuario. • http://www.securityfocus.com/bid/76836 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454418.htm • CWE-275: Permission Issues •

CVSS: 10.0EPSS: 0%CPEs: 10EXPL: 0

The login page of the server on Huawei FusionServer rack servers RH2288 V3 with software before V100R003C00SPC603, RH2288H V3 with software before V100R003C00SPC503, XH628 V3 with software before V100R003C00SPC602, RH1288 V3 with software before V100R003C00SPC602, RH2288A V2 with software before V100R002C00SPC701, RH1288A V2 with software before V100R002C00SPC502, RH8100 V3 with software before V100R003C00SPC110, CH222 V3 with software before V100R001C00SPC161, CH220 V3 with software before V100R001C00SPC161, and CH121 V3 with software before V100R001C00SPC161 allows remote attackers to bypass access restrictions and enter commands via unspecified parameters, as demonstrated by a "user creation command." La página de inicio de sesión del servidor en los servidores en rack FusionServer RH2288 V3 con software anterior a V100R003C00SPC603, RH2288H V3 anterior a V100R003C00SPC503, XH628 V3 anterior a V100R003C00SPC602, RH1288 V3 anterior a V100R003C00SPC602, RH2288A V2 anterior a V100R002C00SPC701, RH1288A V2 anterior a V100R002C00SPC502, RH8100 V3 anterior a V100R003C00SPC110, CH222 V3 anterior a V100R001C00SPC161, CH220 V3 anterior a V100R001C00SPC161 y CH121 V3 anterior a V100R001C00SPC161 de Huawei permite que los atacantes remotos omitan las restricciones de acceso e introduzcan comandos mediante parámetros no especificados, tal y como se demuestra con un "user creation command". • http://www.securityfocus.com/bid/76836 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454418.htm • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 10EXPL: 0

The management interface on Huawei FusionServer rack servers RH2288 V3 with software before V100R003C00SPC603, RH2288H V3 with software before V100R003C00SPC503, XH628 V3 with software before V100R003C00SPC602, RH1288 V3 with software before V100R003C00SPC602, RH2288A V2 with software before V100R002C00SPC701, RH1288A V2 with software before V100R002C00SPC502, RH8100 V3 with software before V100R003C00SPC110, CH222 V3 with software before V100R001C00SPC161, CH220 V3 with software before V100R001C00SPC161, and CH121 V3 with software before V100R001C00SPC161 does not limit the number of query attempts, which allows remote authenticated users to obtain credentials of higher-level users via a brute force attack. La interfaz de gestión en los servidores en rack FusionServer RH288V3 con software anterior a V100R003C00SPC603, RH2288H V3 anterior a V100R003C00SPC503, XH628 V3 anterior a V100R003C00SPC602, RH1288 V3 anterior a V100R003C00SPC602, RH2288A V2 anterior a V100R002C00SPC701, RH1288A V2 anterior a V100R002C00SPC502, RH8100 V3 anterior a V100R003C00SPC110, CH222 V3 anterior a V100R001C00SPC161, CH220 V3 anterior a V100R001C00SPC161 y CH121 V3 anterior a V100R001C00SPC161 de Huawei no limita el número de intentos de consulta, lo que permite que los usuarios autenticados remotos obtengan credenciales de usuarios de un nivel más alto mediante un ataque de fuerza bruta. • http://www.securityfocus.com/bid/76836 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454418.htm • CWE-254: 7PK - Security Features •