Today is patch Tuesday, and if you have Remote Desktop enabled in Windows, you might want to let Automatic Updates do its thing and reboot at your earliest convenience. That's because Microsoft has patched a couple of "critical" vulnerabilities affecting RDP-enabled systems.
In the company's words, one of the vulnerabilities "could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system." Only systems that have remote desktop actually enabled are vulnerable, but Microsoft recommends that everyone install the update, just in case. Affected operating systems include Windows XP, Vista, and 7, not to mention Windows Server 2003, 2008, and 2008 R2.
In case you're wondering, Microsoft says the update plugs the holes by "modifying the way that the Remote Desktop Protocol processes packets in memory and the way that the RDP service processes packets."
|Velocity Micro workstations harness Epyc, Threadripper, and Xeon SP||12|
|Intel enjoyed strong growth in nearly all of its businesses in Q2||4|
|AMD's Wraith Max CPU cooler is now available in stores||6|
|Take your Pants for a Walk Day Shortbread||18|
|Toshiba puts 64-layer flash to work in the TR200 SSDs||3|
|Threadripper CPUs sneak into pre-built PC listings||19|
|AMD's Ryzen 3 1300X and Ryzen 3 1200 CPUs reviewed||60|
|Silverstone shines RGB LEDs on the Mini-ITX RVZ03 chassis||10|
|Radeon Software Crimson ReLive Edition 17.7.2 boasts refinements galore||17|
|edit: i'm not funny||+43|