[HN Gopher] Fixing critical vulnerabilities in Apache's remote d... ___________________________________________________________________ Fixing critical vulnerabilities in Apache's remote desktop Author : miles Score : 48 points Date : 2020-07-02 16:51 UTC (6 hours ago) (HTM) web link (blog.checkpoint.com) (TXT) w3m dump (blog.checkpoint.com) | beh9540 wrote: | I applaud them for using open source software, and contributing | back their findings, but my first thought reading this was "isn't | it a little odd a security appliance vendor who actively markets | a "Remote Secure Access" system doesn't rely on there own | systems?" Their website has a whitepaper link on every page on | how your business should use them for remote access. | spydum wrote: | 'We chose two different remote access solutions, so in the | event of one failing, we would have redundancy and an | alternative to enable work to continue," says Fischbein, "One | of the solutions was based on open-source Apache Guacamole' | | I suspect you are right that it's just a story telling prop, | but they did address why it might be practical for them to have | such a solution in place. | eyalitki wrote: | Here is the link to the full technical paper: | https://research.checkpoint.com/2020/apache-guacamole-rce/ | llbeansandrice wrote: | I didn't realize the tool was called "guacamole". Now the | headline makes more sense. ___________________________________________________________________ (page generated 2020-07-02 23:00 UTC)