Rich Freeman via plug on 3 Jul 2020 04:14:26 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Apache Guacamole CVEs (2020-9497 and 2020-9498)


On Thu, Jul 2, 2020 at 9:32 PM JP Vossen via plug
<plug@lists.phillylinux.org> wrote:
>
> Israeli infosec outfit Check Point discovered the reverse RDP flaws, an
> attack method that allows a compromised host to transmit malware to a
> clean client machine opening a remote desktop protocol (RDP) session
> with it.
> ...

Hadn't heard of Reverse RDP but what I got out of about 30 seconds of
Googling made my jaw drop.

This seems like it has been a bit of a treasure trove of windows
vulnerabilities - it sounds like Guacamole uses RDP internally so it
would have the same issues.  I'd think any linux RDP client would need
to be looked at if this wasn't already done.

Reminds me of the golden era when MS office had zero concern for
exploits in VBA/etc so opening a random word doc was basically like
running an exe file.

Stuff like Citrix/RDP/etc often has ways to do things like map client
printers/drives/etc to the server to make applications operate more
seamlessly, but these sorts of things are obviously a way for a
compromised server to get back into the host.  Things like ssh agents
need to be protected against similar attacks on linux, and X11
security extensions with ssh have been a thing for a long time for the
same reason.  Once your terminal is more than just a terminal you have
to be concerned with what the remote host is sending you...

-- 
Rich
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug