Welcome Guest! To enable all features please try to register or login.
Options
View
Go to last post Go to first unread
Textbook1987  
#1 Posted : Wednesday, February 6, 2019 11:28:06 AM(UTC)
Textbook1987
Rank: Nestling
Joined: 3/4/2018(UTC)
Posts: 1
Timothy  
#2 Posted : Monday, February 25, 2019 1:11:04 AM(UTC)
Timothy
Rank: Flock Leader
Joined: 1/26/2007(UTC)
Posts: 579
Was thanked: 10 time(s) in 10 post(s)
RD Tabs uses the same underlying Microsoft libraries for RDP, so it is as vulnerable as MSTSC is with regards to protocol vulnerabilities. As such, bugs in the protocol layer are also as patched as your local operating system installation is. That is to say, if there is a security vulnerability in Remote Desktop, once you patch Windows using Windows Update, RD Tabs will also be patched.

However, the "exploits" shown in the article that MSTSC is vulnerable to are simply taking advantage of valid established functionality, they are not actual security vulnerabilities or bugs. The shared clipboard feature, in particular, binds together the local and remote clipboards by design. That is what the feature is designed to do and as such it should only be used with trusted remote machines. If you are connecting to an untrusted remote desktop, you should not enable any resource sharing at all. This is easy to disable in RD Tabs. Just go to the Resources tab on the connection and uncheck everything under "Redirect Local Resources."
Rss Feed  Atom Feed
Users browsing this topic
Similar Topics
Reverse RDP Attack: Code Execution on RDP Clients (RD Tabs Support)
by User01 2/6/2019 9:51:20 PM(UTC)
Forum Jump  
You cannot post new topics in this forum.
You cannot reply to topics in this forum.
You cannot delete your posts in this forum.
You cannot edit your posts in this forum.
You cannot create polls in this forum.
You cannot vote in polls in this forum.

Notification

Icon
Error