Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Windows: Prevent a worm by updating Remote Desktop Services (Critical! Patch Now!)
Microsoft Technet ^ | May 14, 2019 | Microsoft Security Response Center Team

Posted on 05/20/2019 5:30:49 PM PDT by dayglored

[dayglored's note: This is direct from the horse's mouth, Microsoft Technet. It's a bad one, like the WannaCry malware from a couple years ago.]

Today [May 14] Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware.

Now that I have your attention, it is important that affected systems are patched as quickly as possible to prevent such a scenario from happening. In response, we are taking the unusual step of providing a security update for all customers to protect Windows platforms, including some out-of-support versions of Windows.

Vulnerable in-support systems include Windows 7, Windows Server 2008 R2, and Windows Server 2008. Downloads for in-support versions of Windows can be found in the Microsoft Security Update Guide. Customers who use an in-support version of Windows and have automatic updates enabled are automatically protected. 

Out-of-support systems include Windows 2003 and Windows XP. If you are on an out-of-support version, the best way to address this vulnerability is to upgrade to the latest version of Windows. Even so, we are making fixes available for these out-of-support versions of Windows in KB4500705.

Customers running Windows 8 and Windows 10 are not affected by this vulnerability, and it is no coincidence that later versions of Windows are unaffected. Microsoft invests heavily in strengthening the security of its products, often through major architectural improvements that are not possible to backport to earlier versions of Windows.

There is partial mitigation on affected systems that have Network Level Authentication (NLA) enabled. The affected systems are mitigated against ‘wormable’ malware or advanced malware threats that could exploit the vulnerability, as NLA requires authentication before the vulnerability can be triggered. However, affected systems are still vulnerable to Remote Code Execution (RCE) exploitation if the attacker has valid credentials that can be used to successfully authenticate.

It is for these reasons that we strongly advise that all affected systems – irrespective of whether NLA is enabled or not – should be updated as soon as possible.

Resources
Links to downloads for Windows 7, Windows 2008 R2, and Windows 2008
Links to downloads for Windows 2003 and Windows XP

Simon Pope, Director of Incident Response, Microsoft Security Response Center (MSRC)


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: dsj02; microsoft; patchtuesday; remotedesktop; wannacry; windows; windowspinglist; worm
Navigation: use the links below to view more comments.
first 1-2021-4041-55 next last
Executive Summary:
    Patch Windows Now.
This one is so bad Microsoft released a patch for Windows XP and Server 2003.

The vulnerability affects Windows 7 and earlier, and Windows Server 2008R2 and earlier.

1 posted on 05/20/2019 5:30:49 PM PDT by dayglored
[ Post Reply | Private Reply | View Replies]

To: Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; AppyPappy; arnoldc1; ATOMIC_PUNK; bajabaja; ...
Critical Patch -- Do It Now ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

2 posted on 05/20/2019 5:31:31 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Quick, transform to Linux....


3 posted on 05/20/2019 5:31:34 PM PDT by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Should I update my XP VMs?


4 posted on 05/20/2019 5:32:09 PM PDT by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Those of us who are still running Windows 7 (or XP) need this patch if the computer is connected to anything else (Internet, other Windows computers, etc.)

Windows 8, 8.1, and 10, and Server 2012, 2016, 2019 are not affected by this worm.

5 posted on 05/20/2019 5:33:08 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2
> Should I update my XP VMs?

Yes, if you have them connected to anything else. Note that this vulnerability is in the Remote Desktop service, so if you're not using Remote Desktop Connection, you're okay, but most people do have it enabled.

6 posted on 05/20/2019 5:35:00 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Paladin2
> Quick, transform to Linux....

Or Windows 10, which doesn't have this particular vulnerability. :-)

7 posted on 05/20/2019 5:35:41 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 3 | View Replies]

To: dayglored

The cynic in me asks if this isn’t a back door approach for MS to degrade the performance of legacy OS’s.


8 posted on 05/20/2019 5:37:01 PM PDT by Don W (When blacks riot, neighbourhoods and cities burn. When whites riot, nations and continents burn.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: dayglored

Windows 10 —> Hardware Upgrade, purge no longer supported old stuff.


9 posted on 05/20/2019 5:39:53 PM PDT by Paladin2
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored

So, I hope w Win. 10 I am safe from this.


10 posted on 05/20/2019 5:41:15 PM PDT by Innovative
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Thanks, I’ll have to go review and make sure that that feature[bug?] is Kilt.

Whatta bout VNC?


11 posted on 05/20/2019 5:42:59 PM PDT by Paladin2
[ Post Reply | Private Reply | To 6 | View Replies]

To: Innovative; dayglored

My Geek Squad guy looked it up for me and said you’re fine with Window 10 (But apparently you do for W7 and XP).

Don’t know why that can’t be in the Headline - make it easier for folks.


12 posted on 05/20/2019 5:44:15 PM PDT by Jim W N (MAGA by restoring the Gospel of the Grace of Christ and our Free Constitutional Republic!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: dayglored

Why does it say?

Security Vulnerability

Published: 05/14/2019


13 posted on 05/20/2019 5:52:46 PM PDT by McGruff
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jim 0216
> My Geek Squad guy looked it up for me and said you’re fine with Window 10 (But apparently you do for W7 and XP). Don’t know why that can’t be in the Headline - make it easier for folks.

Correct, Win10 is safe from this one.

I couldn't fit it into the headline, so I put it in my #1 comment.

14 posted on 05/20/2019 5:56:27 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Paladin2
> Whatta bout VNC?

VNC is a totally different protocol, different service. Unaffected by this; AFAIK the concern is just RDP.

15 posted on 05/20/2019 5:57:30 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Innovative
> So, I hope w Win. 10 I am safe from this.

Yep, Win10 is unaffected by this one.

16 posted on 05/20/2019 5:58:35 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Don W
> The cynic in me asks if this isn’t a back door approach for MS to degrade the performance of legacy OS’s.

Nah, highly unlikely it's intentional.

HOWEVER, it is certainly a reminder that running older releases of Windows is even more risky than running recent releases of Windows.

Microsoft REALLY, REALLY, REALLY wants you to migrate to Windows 10.

REALLY.

17 posted on 05/20/2019 6:00:27 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 8 | View Replies]

To: dayglored

I think I’m safe with my Win98. It cant even hold the update file its memory is so small !!


18 posted on 05/20/2019 6:04:22 PM PDT by George from New England (escaped CT in 2006, now living north of Tampa)
[ Post Reply | Private Reply | To 17 | View Replies]

To: dayglored

Since 2000, I’ve disabled Remote Desktop Connections after every new installation of Windows. Call me paranoid, lol.


19 posted on 05/20/2019 6:05:21 PM PDT by thescourged1
[ Post Reply | Private Reply | To 1 | View Replies]

To: George from New England
> ...safe with my Win98...

Wow. Well, yeah, in this particular regard.

But I certainly hope you're not using Win98 to access the internet.

20 posted on 05/20/2019 6:22:48 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-55 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson