Today is patch Tuesday, and if you have Remote Desktop enabled in Windows, you might want to let Automatic Updates do its thing and reboot at your earliest convenience. That's because Microsoft has patched a couple of "critical" vulnerabilities affecting RDP-enabled systems.
In the company's words, one of the vulnerabilities "could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system." Only systems that have remote desktop actually enabled are vulnerable, but Microsoft recommends that everyone install the update, just in case. Affected operating systems include Windows XP, Vista, and 7, not to mention Windows Server 2003, 2008, and 2008 R2.
In case you're wondering, Microsoft says the update plugs the holes by "modifying the way that the Remote Desktop Protocol processes packets in memory and the way that the RDP service processes packets."
|Here's the not-so-live video version of The TR Podcast 164||16|
|Here's what's cooking in Damage Labs||34|
|Deal of the week: An IPS ultra-wide for $420, plus cheap SSDs and more||30|
|Microsoft's quarterly revenue up 25% on strong Surface, Xbox sales||24|
|Assassin's Creed Unity PC requires 6GB of RAM, GTX 680||238|
|Join us as we attempt to live stream The TR Podcast tonight||13|
|Civ: Beyond Earth with Mantle aims to end multi-GPU microstuttering||75|
|CPU startup claims to achieve 3x IPC gains with VISC architecture||62|
|I just found this AMAZING trick! Call of Duty takes up 0GB if you just don't buy it!||+122|