Description
Untrusted search path vulnerability in the client in Remote Desktop Protocol (RDP) through 8.1 in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Protocol DLL Planting Remote Code Execution Vulnerability."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-06T05:17:27.000Z
Reserved: 2015-03-19T00:00:00.000Z
Link: CVE-2015-2473
No data.
Status : Modified
Published: 2015-08-15T00:59:33.017
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-2473
No data.
OpenCVE Enrichment
No data.
Weaknesses