Page 2 of 7 results (0.004 seconds)

CVSS: 9.3EPSS: 34%CPEs: 5EXPL: 0

Heap-based buffer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a long CSEC HTTP response header. Desbordamiento de buffer basado en memoria dinámica en el método StartEpa en el control nsepacom ActiveX (nsepa.exe) en Citrix Access Gateway Enterprise Edition Plug-in para Windows 9.x anterior a 9.3-57.5 y 10.0 anterior a 10.0-69.4 permite a atacantes remotos ejecutar código arbitrario a través de una cabecera larga de respuesta CSEC HTTP. • http://archives.neohapsis.com/archives/bugtraq/2012-08/0009.html http://osvdb.org/show/osvdb/84433 http://secunia.com/secunia_research/2012-27 http://support.citrix.com/article/CTX134303 https://exchange.xforce.ibmcloud.com/vulnerabilities/77316 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 5%CPEs: 2EXPL: 0

Integer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a crafted Content-Length HTTP header, which triggers a heap-based buffer overflow. Desbordamiento de enteros en el método StartEpa en el control nsepacom ActiveX (nsepa.exe) en Citrix Access Gateway Enterprise Edition Plug-in para Windows 9.x anterior a 9.3-57.5 y 10.0 anterior a 10.0-69.4 permite a atacantes remotos ejecutar código arbitrario a través de una cabecera Content-Length HTTP manipulada, lo que provoca un desbordamiento de buffer basado en memoria dinámica. • http://secunia.com/advisories/45299 http://secunia.com/secunia_research/2012-26 http://support.citrix.com/article/CTX134303 https://exchange.xforce.ibmcloud.com/vulnerabilities/77317 • CWE-189: Numeric Errors •