T 5.132 Compromising RPD user sessions under Windows server 2003 and higher

The Remote Desktop release based on the Remote Desktop Protocol (RDP) is an effective and widely used resource for remotely maintaining a Windows server and for using programmes on remote computers (remote desktops). A client is connected to the RDP server without checking the authentication of the user beforehand. The entire login screen of the remote desktop is shown directly on the screen of the local client. There is therefore a risk of an attacker gaining remote access to the system by logging in using the Windows RDP.

Information on the operating system version and on membership in domains of the Windows servers is available to every remote desktop user without the user having to enter a user name and password. Additional information can be obtained from background images. In many cases, administrators display administration information as a background image, or the server manufacturer has provided a proprietary default background image for pre-installed operating systems. Valuable information can be obtained using this image to analyse the system and exploit the corresponding security gaps.

When the network connection is interrupted during a RDP session, Windows Server 2003 automatically restores the session without requiring the user to log in again as soon as the client is reconnected to the server over the network. The network downtimes can even last minutes in such cases. A higher level of fault tolerance is gained, but at the expense of a threat to the integrity of a RDP session. An attacker can gain remote access to the system through social engineering or by tapping the connection. A connection using RDP Version 5.2 in Windows Server 2003 can be easily tapped by third parties and redirected to a new destination without detection. Since the release of Windows Server 2003 Service Pack 1, you have the ability to secure the connection with SSL, but many clients are not able to establish connections any more, for example Remote Desktop clients from previous Windows versions and RDesktop for Unix/Linux. For this reason, SSL usually cannot be used everywhere to secure communication, and the risk of tapping the connection and of gaining access to the system without authorisation still exists.

Due the risks and threats described, a higher level of risk must be assumed to exist for the server as soon as RDP is used.