Re: RE: Microsoft RDP Priv. Escalation

From: Jarrod Frates (jfrates.ml@gmail.com)
Date: Wed Apr 09 2008 - 13:40:56 EDT


On Tue, Apr 8, 2008 at 8:04 PM, <Yousif@vapt-sec.com> wrote:
> The information about the insecurity isn't illegal as I did not use valid information from any .RDP connection file.

While it technically may not have been illegal, it was almost
certainly an ethical breach. If this is a real exploit (and I am
withholding judgment at this point as I have not tested the reported
circumstances), disclosing it in public without the explicit approval
of your client is unethical, and may even be a breach of contract. On
top of that, publicizing an exploit without notifying the vendor is
irresponsible disclosure, another ethical lapse.

What is unclear here is whether the cmd.exe was disabled or merely
hidden, and even if it was disabled whether batch processing was
disabled, which could account for this.

-- 
Jarrod Frates, GAWN
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------
-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:30 EDT