CVE-2002-0863
Summary
| CVE | CVE-2002-0863 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2002-10-11 04:00:00 UTC |
| Updated | 2019-04-30 14:27:00 UTC |
| Description | Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol." |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Microsoft | .net Windows Server | beta3 | All | standard | All |
| Application | Microsoft | .net Windows Server | beta3 | All | standard | All |
| Operating System | Microsoft | Windows 2000 | All | All | All | All |
| Operating System | Microsoft | Windows 2000 | All | sp1 | All | All |
| Operating System | Microsoft | Windows 2000 | All | sp2 | All | All |
| Operating System | Microsoft | Windows 2000 | All | sp3 | All | All |
| Operating System | Microsoft | Windows 2000 | All | All | All | All |
| Operating System | Microsoft | Windows 2000 | All | sp1 | All | All |
| Operating System | Microsoft | Windows 2000 | All | sp2 | All | All |
| Operating System | Microsoft | Windows 2000 | All | sp3 | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | All | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | sp1 | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | sp2 | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | sp3 | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | All | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | sp1 | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | sp2 | All | All |
| Operating System | Microsoft | Windows 2000 Terminal Services | All | sp3 | All | All |
| Operating System | Microsoft | Windows Nt | 4.0 | All | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp1 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp2 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp3 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp4 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp5 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp6 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp6a | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | All | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp1 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp2 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp3 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp4 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp5 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp6 | terminal_server | All |
| Operating System | Microsoft | Windows Nt | 4.0 | sp6a | terminal_server | All |
| Operating System | Microsoft | Windows Xp | All | All | 64-bit | All |
| Operating System | Microsoft | Windows Xp | All | All | home | All |
| Operating System | Microsoft | Windows Xp | All | gold | professional | All |
| Operating System | Microsoft | Windows Xp | All | sp1 | 64-bit | All |
| Operating System | Microsoft | Windows Xp | All | sp1 | home | All |
| Operating System | Microsoft | Windows Xp | All | All | 64-bit | All |
| Operating System | Microsoft | Windows Xp | All | All | home | All |
| Operating System | Microsoft | Windows Xp | All | gold | professional | All |
| Operating System | Microsoft | Windows Xp | All | sp1 | 64-bit | All |
| Operating System | Microsoft | Windows Xp | All | sp1 | home | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 'Microsoft Windows Remote Desktop Protocol checksum and keystroke' - MARC | BUGTRAQ | marc.info | |
| CERT/CC Vulnerability Note VU#865833 | CERT-VN | www.kb.cert.org | US Government Resource |
| Microsoft Windows Encrypted RDP Packet Information Leakage Vulnerability | BID | www.securityfocus.com | |
| Microsoft Windows RDP Keystroke Injection Vulnerability | BID | www.securityfocus.com | |
| 'Microsoft Windows Terminal Services vulnerabilities' - MARC | BUGTRAQ | marc.info | |
| Microsoft Security Bulletin MS02-051 - Moderate | Microsoft Docs | MS | docs.microsoft.com | |
| ISS X-Force Database: win-rdp-keystroke-monitoring (10122): Windows Remote Desktop Protocol could allow an attacker to monitor keystrokes | XF | www.iss.net | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| ISS X-Force Database: win-rdp-checksum-leak (10121): Windows Remote Desktop Protocol checksum information leak | XF | www.iss.net | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.