SB2024121078 - Multiple vulnerabilities in Microsoft Windows Remote Desktop Services
Published: December 10, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Sensitive Data Storage in Improperly Locked Memory (CVE-ID: CVE-2024-49123)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to sensitive data storage in improperly locked memory in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
2) Use-after-free (CVE-ID: CVE-2024-49116)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
3) Type Confusion (CVE-ID: CVE-2024-49119)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
4) Resource exhaustion (CVE-ID: CVE-2024-49075)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in Windows Remote Desktop Services. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
5) Insecure Default Variable Initialization (CVE-ID: CVE-2024-49120)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insecure default variable initialization in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
6) Sensitive Data Storage in Improperly Locked Memory (CVE-ID: CVE-2024-49108)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to sensitive data storage in improperly locked memory in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
7) Sensitive Data Storage in Improperly Locked Memory (CVE-ID: CVE-2024-49106)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to sensitive data storage in improperly locked memory in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
8) Sensitive Data Storage in Improperly Locked Memory (CVE-ID: CVE-2024-49115)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to sensitive data storage in improperly locked memory in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
9) Sensitive Data Storage in Improperly Locked Memory (CVE-ID: CVE-2024-49132)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to sensitive data storage in improperly locked memory in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
10) Sensitive Data Storage in Improperly Locked Memory (CVE-ID: CVE-2024-49128)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to sensitive data storage in improperly locked memory in Windows Remote Desktop Services. A remote attacker can cause a race condition and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49123
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49116
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49119
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49075
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49120
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49108
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49106
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49115
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49132
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-49128