vendor:
XenApp and XenDesktop
by:
n.runs AG
9.3
CVSS
HIGH
Stack-Based Buffer Overflow in Citrix XML Service
119
CWE
Product Name: XenApp and XenDesktop
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:citrix:xenapp_and_xendesktop
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2011
n.runs-SA-2011.001
A stack-based buffer overflow has been found in the Citrix XML Service of XenApp and XenDesktop which is installed on every server used for sharing applications. Successful exploitation allows arbitrary code execution on the server running the XML service. The issue can be exploited with network access to the XML service interface. But exploitation can also be performed with unauthenticated access to the Citrix web frontend which is exposed to the Internet in many cases. The overflow occurs when the length of the 'ClientName' property is greater than the size of the stack buffer.
Mitigation:
See the Citrix security bulletin [2] for a list of affected versions and patches.