Today is patch Tuesday, and if you have Remote Desktop enabled in Windows, you might want to let Automatic Updates do its thing and reboot at your earliest convenience. That's because Microsoft has patched a couple of "critical" vulnerabilities affecting RDP-enabled systems.
In the company's words, one of the vulnerabilities "could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system." Only systems that have remote desktop actually enabled are vulnerable, but Microsoft recommends that everyone install the update, just in case. Affected operating systems include Windows XP, Vista, and 7, not to mention Windows Server 2003, 2008, and 2008 R2.
In case you're wondering, Microsoft says the update plugs the holes by "modifying the way that the Remote Desktop Protocol processes packets in memory and the way that the RDP service processes packets."
|1. GKey13 - $650||2. JohnC - $600||3. davidbowser - $501|
|4. cmpxchg - $500||5. DeadOfKnight - $400||6. danny e. - $375|
|7. the - $360||8. Ryszard - $351||9. rbattle - $350|
|10. Ryu Connor - $350|
|Micron's M600 SSD accelerates writes with dynamic SLC cache||3|
|32GB Shield tablet with LTE goes up for pre-order||0|
|Adata's Premier SP610 solid-state drive reviewed||6|
|The TR Hardware Survey 2014: What's inside your main desktop PC?||280|
|DisplayPort 1.3 supports 5K displays, 4K at 120Hz||55|
|Microsoft officially announces $2.5B Minecraft buyout||115|
|Videos show Win9 preview's virtual desktops, notification center||44|
|Friday Evening Shortbread||70|
|Friday night topic: How often do you unplug?||84|