Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


Wiggly Wayne DDS posted:

been a while since the last pre-auth rdp rce

CVSS3 Base 9.8 score, pre-authentication, wormable attack against RDP:

quote:

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

lol

Adbot
ADBOT LOVES YOU

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


BangersInMyKnickers posted:

yeah but it will also accept legacy RDP. I think you need to screw with GPOs to make it not accept them

you do have to force NLA-only mode via gpo/registry. i have that set but patched it anyways because why not

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


also this affects winxp/server 2003 and it's so bad they are pushing legacy patches for those out of support platforms. there's going to be a ton of servers out there that still accept pre-NLA RDP so yeah this could get ugly

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


BangersInMyKnickers posted:

Yeah I think that's why it doesn't impact newer OS's, they stopped supporting legacy RDP auth because that all old lovely XP/2003 could do but we're well pass end of their service life and MS is actually shutting off legacy protocols by default in their new releases

yeah, NLA is required on windows 8+/server 2012+ so they are safe. they should have switched it so have you turn NLA explictly off with an update for 7/2008r2 when xp/2003 went eol but that's microsoft :shrug:

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


let's add this bullshit to the pile today: https://cpu.fail/

all intel cpus since nehalem vulnerable to some degree of side channel attacks, some of which can only be mitigated fully by disabling hyperthreading entirely

yikes

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


pseudorandom name posted:

these are the "Lenovo microcode" CVEs we were talking about earlier

oh ok. there's been a lot of poo poo flying around today

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


BangersInMyKnickers posted:

the amd ones seem fine for now. probably something to do with having actual consideration for security implications in their architecture instead of blindly chasing IPC gains

it turns out that when you cheat and cut corners with your designs with the goal of improving speed at any cost you tend to create security vulnerabilities. i'm kind of laughing at the fact that the hardware fixes in the newest coffee lake processors seem to make at least meltdown easier, probably because intel rushed to fix the problem without really paying full attention to the implications of their fix

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


Lutha Mahtin posted:

is this true? or is it just coincidence that intel has been hit harder so far

amd had some exposure to spectre like everyone else did, but none of the other side-channel attacks seem to have affected them (or at least there is no proven exploit for AMD to date)

Adbot
ADBOT LOVES YOU

Number19
May 14, 2003

HOCKEY OWNS
FUCK YEAH


sounds like so long as you have NLA on those RDP vulnerabilities aren't wormable and thus you don't need to rush to patch them

if you somehow have NLA off in 2019 then wtf are you doing?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply