CVE-2019-0708 (CNNVD-201905-434)

CRITICAL 有利用代码
中文标题:
Microsoft Remote Desktop Client 资源管理错误漏洞
英文标题:
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal S...
CVSS分数: 9.8
发布时间: 2019-05-16 18:17:00
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v7
漏洞描述
中文描述:

Microsoft Remote Desktop Client是美国微软(Microsoft)公司的一款远程桌面客户端。 Microsoft Remote Desktop Client存在资源管理错误漏洞,该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下产品及版本受到影响:Microsoft Windows 7 SP1,Windows Server 2008 SP2,Windows Server 2008 R2 SP1。

英文描述:

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.

CWE类型:
CWE-416
标签:
dos windows n1xbyte RAMELLA Sebastien remote Metasploit windows_x86 0xeb-bp
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Windows 7 for 32-bit Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows:7_for_32-bit_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows 7 for x64-based Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows:7_for_x64-based_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Core installation) - - cpe:2.3:a:microsoft:windows_server:2008_r2_for_x64-based_systems_service_pack_1_(core_installation):*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows_server:2008_r2_for_itanium-based_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows_server:2008_r2_for_x64-based_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Core installation) - - cpe:2.3:a:microsoft:windows_server:2008_for_32-bit_systems_service_pack_2_(core_installation):*:*:*:*:*:*:*
Microsoft Windows Server 2008 for Itanium-Based Systems Service Pack 2 - - cpe:2.3:a:microsoft:windows_server:2008_for_itanium-based_systems_service_pack_2:*:*:*:*:*:*:*
Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 - - cpe:2.3:a:microsoft:windows_server:2008_for_32-bit_systems_service_pack_2:*:*:*:*:*:*:*
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 - - cpe:2.3:a:microsoft:windows_server:2008_for_x64-based_systems_service_pack_2:*:*:*:*:*:*:*
Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 (Core installation) - - cpe:2.3:a:microsoft:windows_server:2008_for_x64-based_systems_service_pack_2_(core_installation):*:*:*:*:*:*:*
microsoft windows_7 - - - cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
microsoft windows_server_2008 - - - cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
microsoft windows_server_2008 r2 - - cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
siemens axiom_multix_m_firmware * - - cpe:2.3:o:siemens:axiom_multix_m_firmware:*:*:*:*:*:*:*:*
siemens axiom_vertix_md_trauma_firmware * - - cpe:2.3:o:siemens:axiom_vertix_md_trauma_firmware:*:*:*:*:*:*:*:*
siemens axiom_vertix_solitaire_m_firmware * - - cpe:2.3:o:siemens:axiom_vertix_solitaire_m_firmware:*:*:*:*:*:*:*:*
siemens mobilett_xp_digital_firmware * - - cpe:2.3:o:siemens:mobilett_xp_digital_firmware:*:*:*:*:*:*:*:*
siemens multix_pro_acss_p_firmware * - - cpe:2.3:o:siemens:multix_pro_acss_p_firmware:*:*:*:*:*:*:*:*
siemens multix_pro_p_firmware * - - cpe:2.3:o:siemens:multix_pro_p_firmware:*:*:*:*:*:*:*:*
siemens multix_pro_firmware * - - cpe:2.3:o:siemens:multix_pro_firmware:*:*:*:*:*:*:*:*
siemens multix_pro_acss_firmware * - - cpe:2.3:o:siemens:multix_pro_acss_firmware:*:*:*:*:*:*:*:*
siemens multix_pro_navy_firmware * - - cpe:2.3:o:siemens:multix_pro_navy_firmware:*:*:*:*:*:*:*:*
siemens multix_swing_firmware * - - cpe:2.3:o:siemens:multix_swing_firmware:*:*:*:*:*:*:*:*
siemens multix_top_firmware * - - cpe:2.3:o:siemens:multix_top_firmware:*:*:*:*:*:*:*:*
siemens multix_top_acss_firmware * - - cpe:2.3:o:siemens:multix_top_acss_firmware:*:*:*:*:*:*:*:*
siemens multix_top_p_firmware * - - cpe:2.3:o:siemens:multix_top_p_firmware:*:*:*:*:*:*:*:*
siemens multix_top_acss_p_firmware * - - cpe:2.3:o:siemens:multix_top_acss_p_firmware:*:*:*:*:*:*:*:*
siemens vertix_solitaire_firmware * - - cpe:2.3:o:siemens:vertix_solitaire_firmware:*:*:*:*:*:*:*:*
siemens atellica_solution_firmware * - - cpe:2.3:o:siemens:atellica_solution_firmware:*:*:*:*:*:*:*:*
siemens aptio_firmware * - - cpe:2.3:o:siemens:aptio_firmware:*:*:*:*:*:*:*:*
siemens streamlab_firmware * - - cpe:2.3:o:siemens:streamlab_firmware:*:*:*:*:*:*:*:*
siemens centralink_firmware * - - cpe:2.3:o:siemens:centralink_firmware:*:*:*:*:*:*:*:*
siemens viva_e_firmware * - - cpe:2.3:o:siemens:viva_e_firmware:*:*:*:*:*:*:*:*
siemens viva_twin_firmware * - - cpe:2.3:o:siemens:viva_twin_firmware:*:*:*:*:*:*:*:*
siemens syngo_lab_process_manager * - - cpe:2.3:a:siemens:syngo_lab_process_manager:*:*:*:*:*:*:*:*
siemens rapidpoint_500_firmware * - - cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*
siemens lantis_firmware * - - cpe:2.3:o:siemens:lantis_firmware:*:*:*:*:*:*:*:*
huawei agile_controller-campus_firmware v100r002c00 - - cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c00:*:*:*:*:*:*:*
huawei agile_controller-campus_firmware v100r002c10 - - cpe:2.3:o:huawei:agile_controller-campus_firmware:v100r002c10:*:*:*:*:*:*:*
huawei bh620_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:bh620_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei bh621_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:bh621_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei bh622_v2_firmware v100r001c00 - - cpe:2.3:o:huawei:bh622_v2_firmware:v100r001c00:*:*:*:*:*:*:*
huawei bh640_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:bh640_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei ch121_firmware v100r001c00 - - cpe:2.3:o:huawei:ch121_firmware:v100r001c00:*:*:*:*:*:*:*
huawei ch140_firmware v100r001c00 - - cpe:2.3:o:huawei:ch140_firmware:v100r001c00:*:*:*:*:*:*:*
huawei ch220_firmware v100r001c00 - - cpe:2.3:o:huawei:ch220_firmware:v100r001c00:*:*:*:*:*:*:*
huawei ch221_firmware v100r001c00 - - cpe:2.3:o:huawei:ch221_firmware:v100r001c00:*:*:*:*:*:*:*
huawei ch222_firmware v100r002c00 - - cpe:2.3:o:huawei:ch222_firmware:v100r002c00:*:*:*:*:*:*:*
huawei ch240_firmware v100r001c00 - - cpe:2.3:o:huawei:ch240_firmware:v100r001c00:*:*:*:*:*:*:*
huawei ch242_firmware v100r001c00 - - cpe:2.3:o:huawei:ch242_firmware:v100r001c00:*:*:*:*:*:*:*
huawei ch242_v3_firmware v100r001c00 - - cpe:2.3:o:huawei:ch242_v3_firmware:v100r001c00:*:*:*:*:*:*:*
huawei e6000_firmware v100r002c00 - - cpe:2.3:o:huawei:e6000_firmware:v100r002c00:*:*:*:*:*:*:*
huawei e6000_chassis_firmware v100r001c00 - - cpe:2.3:o:huawei:e6000_chassis_firmware:v100r001c00:*:*:*:*:*:*:*
huawei gtsoftx3000_firmware v200r001c01spc100 - - cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r001c01spc100:*:*:*:*:*:*:*
huawei gtsoftx3000_firmware v200r002c00spc300 - - cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c00spc300:*:*:*:*:*:*:*
huawei gtsoftx3000_firmware v200r002c10spc100 - - cpe:2.3:o:huawei:gtsoftx3000_firmware:v200r002c10spc100:*:*:*:*:*:*:*
huawei oceanstor_18500_firmware v100r001c30spc300 - - cpe:2.3:o:huawei:oceanstor_18500_firmware:v100r001c30spc300:*:*:*:*:*:*:*
huawei oceanstor_18800_firmware v100r001c30spc300 - - cpe:2.3:o:huawei:oceanstor_18800_firmware:v100r001c30spc300:*:*:*:*:*:*:*
huawei oceanstor_18800f_firmware v100r001c30spc300 - - cpe:2.3:o:huawei:oceanstor_18800f_firmware:v100r001c30spc300:*:*:*:*:*:*:*
huawei oceanstor_hvs85t_firmware v100r001c00 - - cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c00:*:*:*:*:*:*:*
huawei oceanstor_hvs85t_firmware v100r001c30spc200 - - cpe:2.3:o:huawei:oceanstor_hvs85t_firmware:v100r001c30spc200:*:*:*:*:*:*:*
huawei oceanstor_hvs88t_firmware v100r001c00 - - cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c00:*:*:*:*:*:*:*
huawei oceanstor_hvs88t_firmware v100r001c30spc200 - - cpe:2.3:o:huawei:oceanstor_hvs88t_firmware:v100r001c30spc200:*:*:*:*:*:*:*
huawei rh1288_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh1288_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh1288a_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh1288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2265_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2265_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2268_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2268_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2285_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2285_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2285h_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2285h_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2288_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2288_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2288a_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2288a_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2288e_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2288e_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2288h_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2288h_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh2485_v2_firmware v100r002c00 - - cpe:2.3:o:huawei:rh2485_v2_firmware:v100r002c00:*:*:*:*:*:*:*
huawei rh5885_v2_firmware v100r001c00 - - cpe:2.3:o:huawei:rh5885_v2_firmware:v100r001c00:*:*:*:*:*:*:*
huawei rh5885_v3_firmware v100r003c00 - - cpe:2.3:o:huawei:rh5885_v3_firmware:v100r003c00:*:*:*:*:*:*:*
huawei smc2.0_firmware v500r002c00 - - cpe:2.3:o:huawei:smc2.0_firmware:v500r002c00:*:*:*:*:*:*:*
huawei smc2.0_firmware v600r006c00 - - cpe:2.3:o:huawei:smc2.0_firmware:v600r006c00:*:*:*:*:*:*:*
huawei seco_vsm_firmware v200r002c00 - - cpe:2.3:o:huawei:seco_vsm_firmware:v200r002c00:*:*:*:*:*:*:*
huawei uma_firmware v200r001c00 - - cpe:2.3:o:huawei:uma_firmware:v200r001c00:*:*:*:*:*:*:*
huawei uma_firmware v300r001c00 - - cpe:2.3:o:huawei:uma_firmware:v300r001c00:*:*:*:*:*:*:*
huawei x6000_firmware v100r002c00 - - cpe:2.3:o:huawei:x6000_firmware:v100r002c00:*:*:*:*:*:*:*
huawei x8000_firmware v100r002c20 - - cpe:2.3:o:huawei:x8000_firmware:v100r002c20:*:*:*:*:*:*:*
huawei elog_firmware v200r003c10 - - cpe:2.3:o:huawei:elog_firmware:v200r003c10:*:*:*:*:*:*:*
huawei espace_ecs_firmware v300r001c00 - - cpe:2.3:o:huawei:espace_ecs_firmware:v300r001c00:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
ExploitDB EDB-46946 EXPLOIT
exploitdb
访问
Download Exploit EDB-46946 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2019-0708 ADVISORY
cve.org
访问
ExploitDB EDB-47120 EXPLOIT
exploitdb
访问
Download Exploit EDB-47120 EXPLOIT
exploitdb
访问
ExploitDB EDB-47416 EXPLOIT
exploitdb
访问
Download Exploit EDB-47416 EXPLOIT
exploitdb
访问
ExploitDB EDB-47683 EXPLOIT
exploitdb
访问
Download Exploit EDB-47683 EXPLOIT
exploitdb
访问
CVSS评分详情
3.1 (adp)
CRITICAL
9.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2019-05-16 18:17:00
修改时间:
2025-10-21 23:45:37
创建时间:
2025-11-11 15:35:25
更新时间:
2025-11-11 16:52:46
利用信息
此漏洞有可利用代码!
利用代码数量: 4
利用来源:
未知 未知 未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2019-0708 2025-11-11 15:19:57 2025-11-11 07:35:25
NVD nvd_CVE-2019-0708 2025-11-11 14:56:22 2025-11-11 07:43:58
CNNVD cnnvd_CNNVD-201905-434 2025-11-11 15:10:12 2025-11-11 07:54:33
EXPLOITDB exploitdb_EDB-46946 2025-11-11 15:05:50 2025-11-11 08:51:31
EXPLOITDB exploitdb_EDB-47120 2025-11-11 15:05:50 2025-11-11 08:51:47
EXPLOITDB exploitdb_EDB-47416 2025-11-11 15:05:57 2025-11-11 08:52:12
EXPLOITDB exploitdb_EDB-47683 2025-11-11 15:05:59 2025-11-11 08:52:46
版本与语言
当前版本: v7
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v7 EXPLOITDB
2025-11-11 16:52:46
references_count: 22 → 24; tags_count: 6 → 8
查看详细变更
  • references_count: 22 -> 24
  • tags_count: 6 -> 8
v6 EXPLOITDB
2025-11-11 16:52:12
references_count: 20 → 22; tags_count: 4 → 6
查看详细变更
  • references_count: 20 -> 22
  • tags_count: 4 -> 6
v5 EXPLOITDB
2025-11-11 16:51:47
references_count: 18 → 20; tags_count: 3 → 4
查看详细变更
  • references_count: 18 -> 20
  • tags_count: 3 -> 4
v4 EXPLOITDB
2025-11-11 16:51:31
references_count: 15 → 18; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 15 -> 18
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:54:33
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201905-434; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-201905-434
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:58
affected_products_count: 10 → 85; references_count: 14 → 15; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 10 -> 85
  • references_count: 14 -> 15
  • data_sources: ['cve'] -> ['cve', 'nvd']