CVE-2019-0708 (CNNVD-201905-434)
CRITICAL
有利用代码
中文标题:
Microsoft Remote Desktop Client 资源管理错误漏洞
英文标题:
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal S...
CVSS分数:
9.8
发布时间:
2019-05-16 18:17:00
漏洞类型:
资源管理错误
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v7
漏洞描述
中文描述:
Microsoft Remote Desktop Client是美国微软(Microsoft)公司的一款远程桌面客户端。 Microsoft Remote Desktop Client存在资源管理错误漏洞,该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下产品及版本受到影响:Microsoft Windows 7 SP1,Windows Server 2008 SP2,Windows Server 2008 R2 SP1。
英文描述:
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
CWE类型:
CWE-416
标签:
dos
windows
n1xbyte
RAMELLA Sebastien
remote
Metasploit
windows_x86
0xeb-bp
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Microsoft | Windows | 7 for 32-bit Systems Service Pack 1 | - | - |
cpe:2.3:a:microsoft:windows:7_for_32-bit_systems_service_pack_1:*:*:*:*:*:*:*
|
| Microsoft | Windows | 7 for x64-based Systems Service Pack 1 | - | - |
cpe:2.3:a:microsoft:windows:7_for_x64-based_systems_service_pack_1:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 R2 for x64-based Systems Service Pack 1 (Core installation) | - | - |
cpe:2.3:a:microsoft:windows_server:2008_r2_for_x64-based_systems_service_pack_1_(core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 R2 for Itanium-Based Systems Service Pack 1 | - | - |
cpe:2.3:a:microsoft:windows_server:2008_r2_for_itanium-based_systems_service_pack_1:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 R2 for x64-based Systems Service Pack 1 | - | - |
cpe:2.3:a:microsoft:windows_server:2008_r2_for_x64-based_systems_service_pack_1:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 for 32-bit Systems Service Pack 2 (Core installation) | - | - |
cpe:2.3:a:microsoft:windows_server:2008_for_32-bit_systems_service_pack_2_(core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 for Itanium-Based Systems Service Pack 2 | - | - |
cpe:2.3:a:microsoft:windows_server:2008_for_itanium-based_systems_service_pack_2:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 for 32-bit Systems Service Pack 2 | - | - |
cpe:2.3:a:microsoft:windows_server:2008_for_32-bit_systems_service_pack_2:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 for x64-based Systems Service Pack 2 | - | - |
cpe:2.3:a:microsoft:windows_server:2008_for_x64-based_systems_service_pack_2:*:*:*:*:*:*:*
|
| Microsoft | Windows Server | 2008 for x64-based Systems Service Pack 2 (Core installation) | - | - |
cpe:2.3:a:microsoft:windows_server:2008_for_x64-based_systems_service_pack_2_(core_installation):*:*:*:*:*:*:*
|
| microsoft | windows_7 | - | - | - |
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
|
| siemens | axiom_multix_m_firmware | * | - | - |
cpe:2.3:o:siemens:axiom_multix_m_firmware:*:*:*:*:*:*:*:*
|
| siemens | axiom_vertix_md_trauma_firmware | * | - | - |
cpe:2.3:o:siemens:axiom_vertix_md_trauma_firmware:*:*:*:*:*:*:*:*
|
| siemens | axiom_vertix_solitaire_m_firmware | * | - | - |
cpe:2.3:o:siemens:axiom_vertix_solitaire_m_firmware:*:*:*:*:*:*:*:*
|
| siemens | mobilett_xp_digital_firmware | * | - | - |
cpe:2.3:o:siemens:mobilett_xp_digital_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_pro_acss_p_firmware | * | - | - |
cpe:2.3:o:siemens:multix_pro_acss_p_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_pro_p_firmware | * | - | - |
cpe:2.3:o:siemens:multix_pro_p_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_pro_firmware | * | - | - |
cpe:2.3:o:siemens:multix_pro_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_pro_acss_firmware | * | - | - |
cpe:2.3:o:siemens:multix_pro_acss_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_pro_navy_firmware | * | - | - |
cpe:2.3:o:siemens:multix_pro_navy_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_swing_firmware | * | - | - |
cpe:2.3:o:siemens:multix_swing_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_top_firmware | * | - | - |
cpe:2.3:o:siemens:multix_top_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_top_acss_firmware | * | - | - |
cpe:2.3:o:siemens:multix_top_acss_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_top_p_firmware | * | - | - |
cpe:2.3:o:siemens:multix_top_p_firmware:*:*:*:*:*:*:*:*
|
| siemens | multix_top_acss_p_firmware | * | - | - |
cpe:2.3:o:siemens:multix_top_acss_p_firmware:*:*:*:*:*:*:*:*
|
| siemens | vertix_solitaire_firmware | * | - | - |
cpe:2.3:o:siemens:vertix_solitaire_firmware:*:*:*:*:*:*:*:*
|
| siemens | atellica_solution_firmware | * | - | - |
cpe:2.3:o:siemens:atellica_solution_firmware:*:*:*:*:*:*:*:*
|
| siemens | aptio_firmware | * | - | - |
cpe:2.3:o:siemens:aptio_firmware:*:*:*:*:*:*:*:*
|
| siemens | streamlab_firmware | * | - | - |
cpe:2.3:o:siemens:streamlab_firmware:*:*:*:*:*:*:*:*
|
| siemens | centralink_firmware | * | - | - |
cpe:2.3:o:siemens:centralink_firmware:*:*:*:*:*:*:*:*
|
| siemens | viva_e_firmware | * | - | - |
cpe:2.3:o:siemens:viva_e_firmware:*:*:*:*:*:*:*:*
|
| siemens | viva_twin_firmware | * | - | - |
cpe:2.3:o:siemens:viva_twin_firmware:*:*:*:*:*:*:*:*
|
| siemens | syngo_lab_process_manager | * | - | - |
cpe:2.3:a:siemens:syngo_lab_process_manager:*:*:*:*:*:*:*:*
|
| siemens | rapidpoint_500_firmware | * | - | - |
cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*
|
| siemens | lantis_firmware | * | - | - |
cpe:2.3:o:siemens:lantis_firmware:*:*:*:*:*:*:*:*
|
| huawei | agile_controller-campus_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | agile_controller-campus_firmware | v100r002c10 | - | - |
cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c10:*:*:*:*:*:*:*
|
| huawei | bh620_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:bh620_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | bh621_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:bh621_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | bh622_v2_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:bh622_v2_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | bh640_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:bh640_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | ch121_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:ch121_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | ch140_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:ch140_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | ch220_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:ch220_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | ch221_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:ch221_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | ch222_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:ch222_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | ch240_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:ch240_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | ch242_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:ch242_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | ch242_v3_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:ch242_v3_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | e6000_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:e6000_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | e6000_chassis_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:e6000_chassis_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | gtsoftx3000_firmware | v200r001c01spc100 | - | - |
cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r001c01spc100:*:*:*:*:*:*:*
|
| huawei | gtsoftx3000_firmware | v200r002c00spc300 | - | - |
cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c00spc300:*:*:*:*:*:*:*
|
| huawei | gtsoftx3000_firmware | v200r002c10spc100 | - | - |
cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c10spc100:*:*:*:*:*:*:*
|
| huawei | oceanstor_18500_firmware | v100r001c30spc300 | - | - |
cpe:2.3:o:huawei:oceanstor_18500_firmware:v100r001c30spc300:*:*:*:*:*:*:*
|
| huawei | oceanstor_18800_firmware | v100r001c30spc300 | - | - |
cpe:2.3:o:huawei:oceanstor_18800_firmware:v100r001c30spc300:*:*:*:*:*:*:*
|
| huawei | oceanstor_18800f_firmware | v100r001c30spc300 | - | - |
cpe:2.3:o:huawei:oceanstor_18800f_firmware:v100r001c30spc300:*:*:*:*:*:*:*
|
| huawei | oceanstor_hvs85t_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | oceanstor_hvs85t_firmware | v100r001c30spc200 | - | - |
cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c30spc200:*:*:*:*:*:*:*
|
| huawei | oceanstor_hvs88t_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | oceanstor_hvs88t_firmware | v100r001c30spc200 | - | - |
cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c30spc200:*:*:*:*:*:*:*
|
| huawei | rh1288_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh1288_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh1288a_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh1288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2265_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2268_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2285_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2285_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2285h_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2285h_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2288_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2288_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2288a_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2288e_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2288e_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2288h_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2288h_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh2485_v2_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:rh2485_v2_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | rh5885_v2_firmware | v100r001c00 | - | - |
cpe:2.3:o:huawei:rh5885_v2_firmware:v100r001c00:*:*:*:*:*:*:*
|
| huawei | rh5885_v3_firmware | v100r003c00 | - | - |
cpe:2.3:o:huawei:rh5885_v3_firmware:v100r003c00:*:*:*:*:*:*:*
|
| huawei | smc2.0_firmware | v500r002c00 | - | - |
cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*
|
| huawei | smc2.0_firmware | v600r006c00 | - | - |
cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*
|
| huawei | seco_vsm_firmware | v200r002c00 | - | - |
cpe:2.3:o:huawei:seco_vsm_firmware:v200r002c00:*:*:*:*:*:*:*
|
| huawei | uma_firmware | v200r001c00 | - | - |
cpe:2.3:o:huawei:uma_firmware:v200r001c00:*:*:*:*:*:*:*
|
| huawei | uma_firmware | v300r001c00 | - | - |
cpe:2.3:o:huawei:uma_firmware:v300r001c00:*:*:*:*:*:*:*
|
| huawei | x6000_firmware | v100r002c00 | - | - |
cpe:2.3:o:huawei:x6000_firmware:v100r002c00:*:*:*:*:*:*:*
|
| huawei | x8000_firmware | v100r002c20 | - | - |
cpe:2.3:o:huawei:x8000_firmware:v100r002c20:*:*:*:*:*:*:*
|
| huawei | elog_firmware | v200r003c10 | - | - |
cpe:2.3:o:huawei:elog_firmware:v200r003c10:*:*:*:*:*:*:*
|
| huawei | espace_ecs_firmware | v300r001c00 | - | - |
cpe:2.3:o:huawei:espace_ecs_firmware:v300r001c00:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
134c704f-9b21-4f2e-91b3-4a467353bcc0
OTHER
nvd.nist.gov
访问
nvd.nist.gov
ExploitDB EDB-46946
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-46946
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2019-0708
ADVISORY
cve.org
访问
cve.org
ExploitDB EDB-47120
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-47120
EXPLOIT
exploitdb
访问
exploitdb
ExploitDB EDB-47416
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-47416
EXPLOIT
exploitdb
访问
exploitdb
ExploitDB EDB-47683
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-47683
EXPLOIT
exploitdb
访问
exploitdb
CVSS评分详情
3.1 (adp)
CRITICAL
9.8
CVSS向量:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2019-05-16 18:17:00
修改时间:
2025-10-21 23:45:37
创建时间:
2025-11-11 15:35:25
更新时间:
2025-11-11 16:52:46
利用信息
此漏洞有可利用代码!
利用代码数量:
4
利用来源:
未知
未知
未知
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-0708 |
2025-11-11 15:19:57 | 2025-11-11 07:35:25 |
| NVD | nvd_CVE-2019-0708 |
2025-11-11 14:56:22 | 2025-11-11 07:43:58 |
| CNNVD | cnnvd_CNNVD-201905-434 |
2025-11-11 15:10:12 | 2025-11-11 07:54:33 |
| EXPLOITDB | exploitdb_EDB-46946 |
2025-11-11 15:05:50 | 2025-11-11 08:51:31 |
| EXPLOITDB | exploitdb_EDB-47120 |
2025-11-11 15:05:50 | 2025-11-11 08:51:47 |
| EXPLOITDB | exploitdb_EDB-47416 |
2025-11-11 15:05:57 | 2025-11-11 08:52:12 |
| EXPLOITDB | exploitdb_EDB-47683 |
2025-11-11 15:05:59 | 2025-11-11 08:52:46 |
版本与语言
当前版本:
v7
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v7
EXPLOITDB
2025-11-11 16:52:46
references_count: 22 → 24; tags_count: 6 → 8
查看详细变更
- references_count: 22 -> 24
- tags_count: 6 -> 8
v6
EXPLOITDB
2025-11-11 16:52:12
references_count: 20 → 22; tags_count: 4 → 6
查看详细变更
- references_count: 20 -> 22
- tags_count: 4 -> 6
v5
EXPLOITDB
2025-11-11 16:51:47
references_count: 18 → 20; tags_count: 3 → 4
查看详细变更
- references_count: 18 -> 20
- tags_count: 3 -> 4
v4
EXPLOITDB
2025-11-11 16:51:31
references_count: 15 → 18; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 15 -> 18
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:54:33
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201905-434; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-201905-434
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:43:58
affected_products_count: 10 → 85; references_count: 14 → 15; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 10 -> 85
- references_count: 14 -> 15
- data_sources: ['cve'] -> ['cve', 'nvd']