MS15-030: Description of the security update for Remote Desktop protocol: March 10, 2015

This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple RDP sessions which fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.
Microsoft has released security bulletin MS15-030. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates:Support for Microsoft Update

Security solutions for IT professionals:TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware:Virus Solution and Security Center

Local support according to your country:International Support

More information
Note This update will only be offered to Windows 7-based computers that have the following update installed:
2592687 Remote Desktop Protocol (RDP) 8.0 update for Windows 7 and Windows Server 2008 R2

Known issues with this security update

  • After you install or uninstall this security update, you may have to restart the computer two times.

    Note We do not recommend that you uninstall any security update.
File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows 7 file information

  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.1.7601.18xxxWindows 7SP1GDR
    6.1.7601.22xxxWindows 7SP1LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

For all supported x86-based versions of Windows 7

File nameFile versionFile sizeDateTimePlatform
Terminalserver-winip.admxNot Applicable8,05604-Jul-201312:19Not Applicable
Terminalserver-winip.admxNot Applicable8,05609-Jul-201306:18Not Applicable

For all supported x64-based versions of Windows 7

File nameFile versionFile sizeDateTimePlatform
Terminalserver-winip.admxNot Applicable8,05604-Jul-201312:19Not Applicable
Terminalserver-winip.admxNot Applicable8,05609-Jul-201306:16Not Applicable
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE

Article ID: 3036493 - Last Review: 04/16/2015 00:13:00 - Revision: 2.0

Windows 7 Service Pack 1

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB3036493