[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Regarding MS12-020



Actually, the tool included (which I will post here since it would be quite difficult to pull the code from the PDF) mitigates WS03 as well.  Mathematically, there is a 1 in 4 billion chance someone could establish an RDP session, but applicably,  no one ever would.  

Security in depth, and least privilege.  It works :)

t

>-----Original Message-----
>From: Jim Harrison [mailto:Jim@xxxxxxxxxxxx]
>Sent: Tuesday, March 20, 2012 1:28 PM
>To: Thor (Hammer of God); 'bugtraq@xxxxxxxxxxxxxxxxx'
>Subject: RE: Regarding MS12-020
>
>Gee, Tim - someone might think you had an axe to grind <ducks swinging
>keyboard>...
>I know; Thor has a hammer, but it still works (barely).
>
>One thing worth mentioning is that there is no mitigation for those who are
>still stuck using WS03, since NLA doesn't exist prior to Vista.
>Those deployments are also great examples of what happens when layer-8 is
>the primary motivating factor in the security choices you make.
>
>Jim
>
>-----Original Message-----
>From: Thor (Hammer of God) [mailto:thor@xxxxxxxxxxxxxxx]
>Sent: Tuesday, March 20, 2012 8:12 AM
>To: 'bugtraq@xxxxxxxxxxxxxxxxx'
>Subject: Regarding MS12-020
>
>PoC code for MS12-020 (RDP) is obviously floating about, and many are still
>worried about worm activity from this.
>
>One of my criticisms about this industry is that rarely is mitigation information
>shared or discussed; people seem to concentrate on breaking and not
>preventing exploitation.  I wanted to point out that anyone who followed the
>processes or techniques in my RDP chapter of Thor's Microsoft Security Bible
>(or used the tool I wrote for RDP access) would have been automatically
>protected from this vulnerability.  That is not a point of ego, just a point of
>fact.
>
>If you are concerned with RDP security, as you should be, you can read most
>(if not all) of Chapter 7 for *free* using the Amazon "preview a page" feature.
>If the RDP vulnerabilities have caused you any level of concern, then I suggest
>you do.  Like I said on the FD list, I'm far more concerned with making sure
>people get the information they need (for free of course) than I am trying to
>earn a buck - anyone who knows me knows I've always freely shared all
>information in an effort to contribute to security.
>
>The first think I will tell you is to always use NLA (network level
>authentication).  It can be a very powerful way to obviate exploitability.  The
>rest of the information is all right there gratis for your viewing pleasure.
>
>If you are in a pinch and need help with any of this, I'll try my best to help if
>you want to ping me offline.   Thanks.
>t
>
>
>---------------------------
>Timothy "Thor"  Mullen
>www.hammerofgod.com
>
>There's no need to think outside the box if you don't think yourself into to
>start with.
>
>
>




[Linux Security]     [Netfilter]     [Linux]     [PHP]     [Photography]     [Yosemite Photos]     [Yosemite News]

Powered by Linux