Today, Microsoft released a set of fixes for a serious vulnerability in Remote Desktop (née Terminal Services), where a remote unauthenticated user can run code on the server as system, and this is a big deal. BIG BIG DEAL.
The always-reliable Brian Krebs reports on it here, and Microsoft's writeup is here.
The purpose of this post is not to talk about the vulnerability, but how it impacts the administrator of an Evolution system.
Short description: Server 2003, Server 2008 and Server 2008 R2 are all vulnerable and must be patched.
Server 2012 and newer are safe.
This vulnerability has nothing to do with Evolution itself, and customers hosted on Asure's AWS infrastructure are not impacted.
Note: Please distinguish between Service Packs (SP1, SP2), which are simply collections of regular updates for an operating system, and "R2" releases of Windows: the latter are different operating systems (e.g., "Server 2008" and "Server 2008 R2" are different systems).
Server 2008 and Server 2008 R2 can be updated via routine Windows Updates, they are included in the monthly rollups for May 2019 (both the standard and the security-only).
Special pain with Server 2003
Server 2003 requires substantial special handling; it doesn't appear to be availble on Windows Update, so the fix must be downloaded directly from Microsoft. I found this link to the Windows Update catalog for Server 2003; choose the patch that applies to your server.
The second complication for Server 2003 is that Internet Explorer on that platform does not appear to support a sufficiently new (and secure) SSL protocol to talk to Microsoft's download servers. You'll need to either use a different (but still probably old and insecure) browser on the 2003 machine, or fetch it from a more modern system and transfer the file over the network. However you get it, get it there.
Yes, I still have customers running Server 2003 in production.
Did I do it right?
It's also important to know how to check: did my server actually receive the critical update? You can find out in Windows Update history by looking for these KB (knowledge base) numbers:
- KB4500331; manually-installed patch for Server 2003
- KB4499149; monthly rollup for Server 2008
- KB4499180; security-only rollup for Server 2008
- KB4499164; monthly rollup for Server 2008 R2
- KB4499175; security-only rollup for Server 2008 R2
If your update history shows the KB update for your operating system, it's good. None of these updates has impacted the Evolution modifier/license, so you can install them without that concern.
Please aggressively check all your servers, not just the ones running Evolution: if a server is exploited (from the inside or the outside), it has the real possibility of causing real havoc in your network.
What about the desktop?
Modern desktop operating systems (Windows 8/8.1 and Windows 10) are not impacted by this, but Windows 7 and XP Service Pack 3 are. Win7 gets the same update as Server 2003 R2, and XP/SP3 gets the Server 2003 update.
I didn't see any mention of Windows Vista, so you may be out of luck.
And if you're still on Window 95, you're not vulnerable :-)