Microsoft RDP Vulnerability PoC

26 Mar

One of the most critical vulnerabilities that exist in Windows platforms is the Remote Desktop Protocol flaw that have discovered from the security researcher Luigi Auriemma.According to Auriemma the vulnerability exists in the handling of the maxChannelIds field of the T.125 ConnectMCSPDU packet.

Microsoft has rated this vulnerability as critical and they are claiming that it could lead to remote code execution.So in this article we are going to see the PoC exploit that have released about the RDP flaw.

We are opening Metasploit Framework and we are searching for the available RDP modules.

Search for RDP exploits


We can see that there is an auxiliary module (ms12_020) that could cause DoS (Denial Of Service) to our targets.We are going to use this module in order to test our systems.

As we can see from the next image this module requires only to put the remote host in order to start sending malformed packets to port 3389.

Configuring the RDP DoS Module


When we run this module we will notice that it will send some packets and then the RDP service will be unavailable causing a DoS to the target machine.

Executing the RDP DoS Module


From the other hand the target machine will respond with a Blue Screen and the system will need to reboot.

Blue Screen after the execution of RDP Module


According to Microsoft the operating systems that this vulnerability affects are:

  • Windows XP SP3
  • Windows XP Professional X64 SP3
  • Windows 2003 Server SP2
  • Windows 2003 Server x64 SP2
  • Windows Vista SP2
  • Windows Vista x64 SP2
  • Windows 2008 Server x32/x64 SP2
  • Windows 7 SP0/SP1
  • Windows 7 x64 SP0/SP1
  • Windows Server 2008 R2 x64 SP0/SP1



As we saw this code  it only causes a DoS on systems that have enable the remote desktop protocol.This exploit is a PoC (Proof of Concept) that the vulnerability exists but that module doesn’t deliver any payload to the remote targets.New exploits that may come out will probably give that option of remote code execution but until now this module is the only that we have when we need to check our systems for the RDP vulnerability.

From the other hand the RDP is a service which is by default disabled in most windows versions and if we already have this service up and running we should disable it immediately in order to avoid being targeted by malicious users.


1 Comment

Posted by on March 26, 2012 in Exploitation Techniques


Tags: , , ,

One response to “Microsoft RDP Vulnerability PoC

  1. Nathalie

    March 26, 2012 at 2:12 pm

    Another awesome blog post! You rock!


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: