CVE-2015-2473

Untrusted search path vulnerability in the client in Remote Desktop Protocol (RDP) through 8.1 in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Protocol DLL Planting Remote Code Execution Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*

History

21 Nov 2024, 02:27

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1033242 - () http://www.securitytracker.com/id/1033242 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-082 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-082 -

Information

Published : 2015-08-15 00:59

Updated : 2024-11-21 02:27


NVD link : CVE-2015-2473

Mitre link : CVE-2015-2473

CVE.ORG link : CVE-2015-2473


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_7