[HN Gopher] Fixing critical vulnerabilities in Apache's remote d...
       ___________________________________________________________________
        
       Fixing critical vulnerabilities in Apache's remote desktop
        
       Author : miles
       Score  : 48 points
       Date   : 2020-07-02 16:51 UTC (6 hours ago)
        
 (HTM) web link (blog.checkpoint.com)
 (TXT) w3m dump (blog.checkpoint.com)
        
       | beh9540 wrote:
       | I applaud them for using open source software, and contributing
       | back their findings, but my first thought reading this was "isn't
       | it a little odd a security appliance vendor who actively markets
       | a "Remote Secure Access" system doesn't rely on there own
       | systems?" Their website has a whitepaper link on every page on
       | how your business should use them for remote access.
        
         | spydum wrote:
         | 'We chose two different remote access solutions, so in the
         | event of one failing, we would have redundancy and an
         | alternative to enable work to continue," says Fischbein, "One
         | of the solutions was based on open-source Apache Guacamole'
         | 
         | I suspect you are right that it's just a story telling prop,
         | but they did address why it might be practical for them to have
         | such a solution in place.
        
       | eyalitki wrote:
       | Here is the link to the full technical paper:
       | https://research.checkpoint.com/2020/apache-guacamole-rce/
        
         | llbeansandrice wrote:
         | I didn't realize the tool was called "guacamole". Now the
         | headline makes more sense.
        
       ___________________________________________________________________
       (page generated 2020-07-02 23:00 UTC)