Avian Waves
®
\
Forums
\
RD Tabs
\
RD Tabs General Discussion
\
Reverse RDP Attack: Code Execution on RDP Clients
Register
Login
Search
Blog
About
Software
Tools
RD Tabs
Legacy
XS BAP
VSCMap
SCHANNEL ADM Template
XS EDB Limit Changer
RemovableStorageDevice ADM Template
Windows Mobile Classic
Music
Discography
Avian Waves
TCX - All We Can Do
Studio
The Black Room
Keyboards
Rack Synths
Effects Processors
Mixing
Monitoring
Interfaces
Sequencing & Editing
Instruments Plugins
Effects Plugins
Contact
Forums
Blog
About
Software
Tools
RD Tabs
Legacy
XS BAP
VSCMap
SCHANNEL ADM Template
XS EDB Limit Changer
RemovableStorageDevice ADM Template
Windows Mobile Classic
Music
Discography
Avian Waves
TCX - All We Can Do
Studio
The Black Room
Keyboards
Rack Synths
Effects Processors
Mixing
Monitoring
Interfaces
Sequencing & Editing
Instruments Plugins
Effects Plugins
Contact
Forums
Welcome Guest! To enable all features please try to register or login.
×
Avian Waves Forums
Search
Help
×
Avian Waves Forums
RD Tabs
RD Tabs General Discussion
Reverse RDP Attack: Code Execution on RDP Clients
Reverse RDP Attack: Code Execution on RDP Clients
Previous Topic
Next Topic
Tools
Watch this topic
Print this topic
Atom Feed
RSS Feed
Textbook1987
50.8% (Neutral)
Nestling
Topic Starter
2019-02-06T11:28:06Z
#1
https://research.checkpo...xecution-on-rdp-clients/
Is RD Tabs vulnerable to this?
View All Posts by User
Timothy
100% (Exalted)
Flock Leader
2019-02-25T01:11:04Z
#2
RD Tabs uses the same underlying Microsoft libraries for RDP, so it is as vulnerable as MSTSC is with regards to protocol vulnerabilities. As such, bugs in the protocol layer are also as patched as your local operating system installation is. That is to say, if there is a security vulnerability in Remote Desktop, once you patch Windows using Windows Update, RD Tabs will also be patched.
However, the "exploits" shown in the article that MSTSC is vulnerable to are simply taking advantage of valid established functionality, they are not actual security vulnerabilities or bugs. The shared clipboard feature, in particular, binds together the local and remote clipboards by design. That is what the feature is designed to do and as such it should only be used with trusted remote machines. If you are connecting to an untrusted remote desktop, you should not enable any resource sharing at all. This is easy to disable in RD Tabs. Just go to the Resources tab on the connection and uncheck everything under "Redirect Local Resources."
View All Posts by User
Atom Feed
Rss Feed
Similar Topics
Reverse RDP Attack: Code Execution on RDP Clients
(
RD Tabs Support
) by
Timothy
2019-02-24T20:15:29Z
Integration with rdp://
(
RD Tabs Support
) by
Felipe
2018-10-19T15:10:34Z
export RDP files
(
RD Tabs Support
) by
Dan C
2015-12-10T06:51:00Z
Overide mstsc.exe (MS RDP)
(
RD Tabs Support
) by
guchdog
2010-08-07T21:50:19Z
Import RDP not working
(
RD Tabs Support
) by
Timothy
2007-12-07T07:29:09Z
Users browsing this topic
Guest (4)
Avian Waves Forums
RD Tabs
RD Tabs General Discussion
Reverse RDP Attack: Code Execution on RDP Clients
full film