MS15-002: Vulnerability in the Windows Telnet service could cause remote code execution: January 13, 2015 Summary. This security update resolves a privately reported vulnerability in Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted packets to an affected Windows-based server.
Resolves a vulnerability in the Microsoft Telnet service protocol that could allow an attacker to use credentials obtained to log back into affected systems. The attacker would then acquire user rights on a system.
MS15-002: Vulnerability in the Windows Telnet service could cause remote code execution: January 13, 2015
Terminal Server Clients use TCP port 3389 to communicate with Terminal Server. A common problem in a WAN environment is that a firewall or other network filter prevents connectivity with this port.
Assume that a computer is running a Telnet service of Subsystem for UNIX-based Applications in Windows 8, Windows Server 2012, Windows 7, or Windows Server 2008 R2. You establish a Telnet session on a client, and then close the Telnet session without closing the other processes that were spawned in the same Telnet session.
To resolve this issue, install this hotfix. Note This hotfix temporarily resolves this issue for application vendors before they migrate their implementation to Windows Filtering Platform (WFP). These application vendors use the TDI filter driver or the TDI extension driver (TDX) on a computer that is running Windows 7 or Windows Server 2008 R2.
Thank you for your feedback!
Thank you for your feedback! It sounds like it might be helpful to connect you to one of our Office support agents.