http://technet.microsoft.com/en-us/secu ... n/MS12-054
I see that the vulnerability is in the way that MS implements the Remote Access Protocol, some form of the RDP protocol if my understanding is correct. My question is, besides RE'ing the fix when it is released, how does one go about building an exploit for this vulnerability? At first I thought just manipulating the packets themselves would be enough, but I have no idea how one would generate application specific packets... I'm not trying to do so, but I am tring to understand the process.