Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug Microsoft Security IT

Windows Remote Desktop Exploit In the Wild 94

angry tapir writes "Luigi Auriemma, the researcher who discovered a recently patched critical vulnerability in Microsoft's Remote Desktop Protocol (RDP), published a proof-of-concept exploit for it after a separate working exploit, which he said possibly originated from Microsoft, was leaked online on Friday. Identified as CVE-2012-0002 and patched by Microsoft on Tuesday, the critical vulnerability can be exploited remotely to execute arbitrary code on systems that accept RDP connections."
This discussion has been archived. No new comments can be posted.

Windows Remote Desktop Exploit In the Wild

Comments Filter:
  • by Svippy ( 876087 ) on Monday March 19, 2012 @05:10AM (#39401125) Homepage

    How often is it 'people with a clue' that attackers are after?

  • Comment removed (Score:3, Insightful)

    by account_deleted ( 4530225 ) on Monday March 19, 2012 @05:25AM (#39401173)
    Comment removed based on user account deletion
  • by rdebath ( 884132 ) on Monday March 19, 2012 @05:30AM (#39401187)

    Except that quote is assuming that the attacker is starting from either now or last tuesday. The POC executable that was leaked was written back in November so there's nothing to say that someone hasn't been working on it the LAST 30 days.

    If that's true expect a worm starting up on Friday evening at the latest.
    The threat is real and the lack of a public RCE means little.

  • Doesn't everyone with a clue use it via a VPN anyway?

    Good way to miss the point.

    The incident brings into question vulnerability Microsoft's program which is intended to alert security partners before the patches themselves are released. The idea is to give the security vendors time to prioritise and test the fixes, however in this instance, it left their customers vulnerable.

    tldr: Microsoft gave hole in Windows to security guys. Security guys gave it to black hats. Customers lost (probably not for the first time...)

  • That's just placing trust in the VPN software, rather than the terminal services server. How does that help? You may trust a particular VPN implementation more than you trust any code out of Microsoft, I guess, but RDP is already encrypted and can be configured to use fairly good authentication.

    Yes, for a business, it is expected that a VPN would be required (because there are a lot of network resources beyond RDP, and because the internal network is typically behind a proxy), but for a home connection that seems excessive. RDP is disabled by default on home installations, but plenty of people enable it at some point and don't later disable it even though it's a potential attack vector - much like SSH, which people also often use without VPN.

    Additionally, there's always the risk of things like a disgruntled employee using this attack from within the corporate network to attack a co-worker (or manager) by changing something on their computer or stealing their credentials, or a corporate spy using it to gain access to data they shouldn't have, or... For remote security vulnerabilities, you need to be a lot more imaginitive in considering threat cases!

  • by jamesh ( 87723 ) on Monday March 19, 2012 @07:12AM (#39401457)

    tldr: Microsoft gave hole in Windows to security guys. Security guys gave it to black hats. Customers lost (probably not for the first time...)

    As soon as you release a patch fixing a problem you've given the black hats enough to exploit it if it is exploitable. A simple binary diff should be enough to figure out what was changed and then it's all over. Releasing actual exploit code only lowers the barrier to entry but a small amount.

  • by jamesh ( 87723 ) on Monday March 19, 2012 @07:17AM (#39401487)

    Doesn't everyone with a clue use it via a VPN anyway?

    RDP with NLA gives you just as much protection as a VPN, and one less layer to worry about.

    Use a VPN if you need to expose services in addition to RDP or need to support really old RDP clients but otherwise a VPN is just additional complexity.

  • by Anonymous Coward on Monday March 19, 2012 @07:35AM (#39401539)

    Doesn't everyone with a clue use it via a VPN anyway?

    Nope.

    RDP has been encrypted and relatively secure for years now. It's frequently "good enough" encryption on its own. Just as SSH is frequently "good enough" on its own, and run without a a VPN.

    I'd suggest that, at this point, running RDP through a VPN doesn't actually get you much more in the way of real security... Although it would allow you to choose specifically who to trust - Cisco, instead of Microsoft, for example.

  • by omglolbah ( 731566 ) on Monday March 19, 2012 @08:01AM (#39401627)

    Not many people with a clue would use Windows for anything serious anyway.

    Well.....

    At -least- 5 different oil rigs in the North Sea run their HMI for operating the process control systems on win2003 server.

    I'm not sure how the people who design this would be considered 'clueless' when it comes to design.

    The usual MS bashing gets old.. but this -is- slashdot after all :p

  • by cusco ( 717999 ) <brian.bixby@gmail . c om> on Monday March 19, 2012 @09:29AM (#39402187)
    Lower cost of code production

    Half-right. The code was written when Server 2003's APIs were the predominant security model on the planet. Unfortunately the new security model in Win7/Svr2008 breaks a lot of that code, sometime in non-obvious ways. An enormous industrial machine code base cannot be ported to the new OSs without major or complete re-writes. A goodly amount of that code is for custom-built systems or machines that are no longer being manufactured but which will continue to function for decades longer, and that code will probably NEVER be ported over.

    I contracted at a utility that had a knee-high pile of ancient Compaq 386 laptops in their radio communications shop. When I offered to dispose of them the guys told me they had a half-million dollar radio tower which used configuration software that would **ONLY** run under MS DOS 3 on a 386 CPU. The manufacturer had been gobbled up by some other company and had no intention of re-writing software for a product that they no longer made. They kept that pile for 14 years, until the tower was finally replaced.

    So, yeah, there's a shitload of that stuff out there and you're just going to have to keep dealing with DOS, Win9x, NT, Win2K, for the next couple of decades.
  • by GIL_Dude ( 850471 ) on Monday March 19, 2012 @09:39AM (#39402263) Homepage
    Yes, most of us use it with VPN. However consider this:

    1) Someone with possibly a bit less skill at finding vulnerabilities takes this code and merges it with a social engineering attack.
    2) The social engineering attack promises the user some silly thing (maybe extra smiley faces or dancing cats).
    3) The user runs the program inside the corporate firewall.
    4) All the company's servers begin blue screening as the user's machine spews these malformed RDP packets.

    Honestly, that's not too far fetched and some type of blended exploit like this will probably happen. That's why it is important to patch machines for this and not think that a border firewall is going to protect you for long.
  • Also also (Score:4, Insightful)

    by Sycraft-fu ( 314770 ) on Monday March 19, 2012 @01:40PM (#39405117)

    VPN often leads to a false sense of security. People see it as a panacea, if you just run VPN everything is good. You can see that on Slashdot with the "How could someone not have it behind VPN?" comments as though VPN is the One True Way(tm) to security and they can't conceive any other way.

    So someone sets up a VPN and has a trusted/untrusted idea with the firewall and then doesn't properly mind after the "trusted" area since after all, there's the magic VPN protecting it. An employee then bring in an infected laptop, or VPNs in from an infect computer, punching through all the defenses and it is game over.

    They are much less safe than someone who does allow RDP in and thus views all networks, including internal, as untrusted and is up on patching this.

    Really VPNs are not a security tool for keeping attacks and so on out. What they are is for logically (virtually) connecting two disparate networks. You have office A and office B and you want them to be one logical network, a VPN will get you that. They are also good for encrypting communications if other security can't be relied upon. For example when I'm in an airport I use VPN since their WiFi is open to the world.

    This idea that they are some sort of wonderful network security is rather flawed, they can be just the opposite. If an outside computer, not controlled by you, is allowed to punch through the firewall using VPN and become "trusted" to a degree, they are less secure. Also sometimes they are bad on the user end too as a number of them punch through user protections. Some VPN/software firewall combinations can't successfully identify the VPN as a network adapter and thus it punches right through all client side filtering. Combine that with a public IP on the end of the VPN concentrator and you can take someone who was protected with a NAT and host based firewall and expose them to the world, just by them logging in.

    Don't get me wrong, I'm not anti-VPN, but people need to think critically about what they are really good for, how they need to be implemented, and stop with this "Everything should be behind VPN, it makes it more secure!" No, it can make it less secure if you fuck up.

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...