Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

false positives: Windows Server 2012 & 2016 #25

Open
meagercreek opened this issue Jun 18, 2019 · 3 comments
Open

false positives: Windows Server 2012 & 2016 #25

meagercreek opened this issue Jun 18, 2019 · 3 comments

Comments

@meagercreek
Copy link

It seems that a license handling error which was fixed at some point in the original rdesktop (possibly here: https://sourceforge.net/p/rdesktop/mailman/message/31932290/ ) is spoiling the vulnerability check against newer systems which are not affected by this vulnerability:

  • true positive (Windows 7):
...
[ ] [10.192.99.137]:3389 - STARTTLS starting TLS ...
[ ] [10.192.99.137]:3389 - subject = ***
[+] [10.192.99.137]:3389 - connection established: using SSL
[+] [10.192.99.137]:3389 - version = v4.8
[+] [10.192.99.137]:3389 - Sending MS_T120 check packet
10.192.99.137 - VULNERABLE - got appid
  • false positive (Windows Server 2016):
...
[ ] [10.221.128.60]:3389 - STARTTLS starting TLS ...
[ ] [10.221.128.60]:3389 - subject = ***
[+] [10.221.128.60]:3389 - connection established: using SSL
[+] [10.221.128.60]:3389 - version = v7.8
[ ] [10.221.128.60]:3389 - License error alert from server: Invalid client
10.221.128.60 - VULNERABLE - got appid

The false positive is missing the part "Sending MS_T120 check packet", i.e. that special request might not have been sent at all but instead the return code from the licensing error could be what triggers the detection result.
The original scanner by zerosum0x0 shows the same behaviour.

PS:
Thank you for the fast fix on issue #8.

@ruudhanegraaf
Copy link

ruudhanegraaf commented Jun 21, 2019

Just came here to report the same issue. Using the console option circumvents it in zero's fork.
https://github.com/zerosum0x0/CVE-2019-0708/issues/16#issue-459354642

I'm a Windows guy however, so I'd prefer to use rdpscan. :-)

Have been using it for a couple of weeks now. Your work is much appreciated. :-)

@cnotin
Copy link

cnotin commented Jul 31, 2019

I confirm the issue and its reason!

@notwhy
Copy link

notwhy commented Jun 22, 2020

same question , please fix it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants