Vulnerability Description
The Terminal Server in Microsoft Windows 2003 Server, when using TLS, allows remote attackers to bypass SSL and self-signed certificate requirements, downgrade the server security, and possibly conduct man-in-the-middle attacks via unspecified vectors, as demonstrated using the Remote Desktop Protocol (RDP) 6.0 client. NOTE: a third party claims that the vendor may have fixed this in approximately 2006.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 2003 Server | All versions |
| Microsoft | Terminal Server | All versions |
References
- http://osvdb.org/36146
- http://www.securityfocus.com/archive/1/468049/100/0/threaded
- http://www.securityfocus.com/archive/1/468057/100/0/threaded
- http://www.securityfocus.com/archive/1/468203/100/0/threaded
- http://www.securityfocus.com/bid/23899
- http://osvdb.org/36146
- http://www.securityfocus.com/archive/1/468049/100/0/threaded
- http://www.securityfocus.com/archive/1/468057/100/0/threaded
- http://www.securityfocus.com/archive/1/468203/100/0/threaded
- http://www.securityfocus.com/bid/23899
FAQ
What is CVE-2007-2593?
CVE-2007-2593 is a vulnerability with a CVSS score of 7.5 (HIGH). The Terminal Server in Microsoft Windows 2003 Server, when using TLS, allows remote attackers to bypass SSL and self-signed certificate requirements, downgrade the server security, and possibly conduc...
How severe is CVE-2007-2593?
CVE-2007-2593 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2593?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 2003 Server, Microsoft Terminal Server.