Press "Enter" to skip to content

Microsoft Alerts Of 2 New Errors In Windows Remote Desktop Services

Microsoft this week claimed that it fixed two new primary security errors in the Windows Desktop Services bundle. These two errors are same to the error dubbed as CVE-2019-0708 (BlueKeep). Microsoft fixed BlueKeep in May and alerted that hackers might abuse it to make “wormable” assaults that spread from one device to another without interaction by user.

This week, Microsoft claimed that it fixed two other BlueKeep-akin security errors, named as CVE-2019-1182 and CVE-2019-1181. Similar to BlueKeep, these two new errors are wormable, and they also live in the Windows RDS (Remote Desktop Services) bundle.

Unlike BlueKeep, these two can’t be used through the RDP (Remote Desktop Protocol), which is usually fraction of the larger RDS bundle.

“The impacted variants of Windows are Windows Server 2008 R2 SP1, Windows 7 SP1, Windows Server 2012 R2, Windows 8.1, Windows Server 2012, and all supported variants of Windows 10, comprising server variants,” claimed Director of Incident Response at the MSRC (Microsoft Security Response Center), Simon Pope, to the media.

“Windows Server 2003, Windows XP, and Windows Server 2008 are not impacted,” he claimed. Pope claimed that the firm discovered about these errors internally, while making an effort improve and harden the security posture of the RDS bundle. RDS (Remote Desktop Services) is the Windows element that lets a consumer to take management of a remote device or virtual device over a network link.

On a related note, SQLite databases can be altered in such a manner that they process malicious code within other applications that depend on them to amass data, security researchers have disclosed.

In demos shown in Las Vegas at the DEF CON security conference earlier, Omer Gull (security researcher at Check Point) displayed demos of a tainted SQLite database hijacking the control and command server of a malware process, and malware employing SQLite to get persistence on iOS machines.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *