This security update resolves two privately reported vulnerabilities in the Remote Desktop protocol. If an attacker sends a series of specially crafted RDP packets to the affected system, the more serious vulnerability in these vulnerabilities could allow remote code execution. By default, Remote Desktop Protocol (RDP) is not enabled by any Windows operating system. No RDP-enabled systems are not compromised.
For all supported versions of Microsoft Windows, this security update is rated "critical." For more information, see the "affected and unaffected Software" section in this section.
This security update resolves vulnerabilities by modifying the way in which the Remote Desktop protocol handles in-memory packets and how the RDP service handles the packets. For more information about these vulnerabilities, see the "Frequently Asked Questions (FAQ)" section of the following section, "Vulnerability information," for a specific vulnerability entry.
Suggestions. Most customers have Automatic Updates enabled and they do not have to take any action because the security update is automatically downloaded and installed. Customers who have not enabled Automatic Updates must check for updates and install the update manually. For information about specific configuration options in Automatic Updates, see Microsoft Knowledge Base article 294871.
For administrators, enterprise installations, or end users who want to manually install this security update, Microsoft recommends that customers use the update management software to apply this update immediately or check for updates using the Microsoft update service.