{"id":4082,"date":"2012-03-16T19:35:35","date_gmt":"2012-03-16T23:35:35","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=4082"},"modified":"2012-03-16T19:35:35","modified_gmt":"2012-03-16T23:35:35","slug":"microsoft-pushes-critical-patch","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-pushes-critical-patch\/","title":{"rendered":"Microsoft pushes critical patch"},"content":{"rendered":"<p>Windows users are being urged to install a patch for a critical flaw in Windows&#8217; Remote Desktop Protocol which can lead to remote code execution.<\/p>\n<p>Microsoft is warning Windows users the world over to apply the security patch released yesterday as soon as possible, following the discovery of a flaw in the Remote Desktop Protocol (RDP) server.<\/p>\n<p>Security Update MS12-020, released as part of the monthly Patch Tuesday update cycle yesterday, is rated &#8216;critical&#8217; by the organisation and addresses a serious flaw with the server used to provide remote access to Windows-based systems.<\/p>\n<p>The company has warned that the flaw allows an attacker to exploit any Windows system running the RDP service over the network, and potentially over the internet providing RDP access is permitted through the firewall as is common for remote access. Worse still, the flaw can be exploited before authentication is requested and allows for remote code execution under the &#8216;system&#8217; privilege level, giving attackers full and unrestricted access to the underlying operating system.<\/p>\n<p><a href=\"http:\/\/www.bit-tech.net\/news\/bits\/2012\/03\/14\/microsoft-rdp-vulnerability\/1\"><span style=\"text-decoration: underline;\"><strong>Read the rest of this article from its source&#8230;<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows users are being urged to install a patch for a critical flaw in Windows&#8217; Remote Desktop Protocol which can lead to remote code execution. Microsoft is warning Windows users the world over to apply the security patch released yesterday as soon as possible, following the discovery of a flaw in the Remote Desktop Protocol (RDP) server. Security\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-pushes-critical-patch\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1656,779,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/4082"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=4082"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/4082\/revisions"}],"predecessor-version":[{"id":4085,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/4082\/revisions\/4085"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=4082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=4082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=4082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}