Page 3 of 17 results (0.010 seconds)

CVSS: 9.3EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in Citrix Presentation Server Client for Windows before 10.0 allows remote web sites to execute arbitrary code via unspecified vectors, related to the implementation of ICA connectivity through proxy servers. Vulnerabilidad no especificada en Citrix Presentation Server Client para Windows anterior a 10.0 permiet a sitios web remotos ejecutar código de su elección a través de vectores no especificados, relacionado con la implementación de conectividad ICA a través de servidores proxy. • http://osvdb.org/33833 http://secunia.com/advisories/24350 http://support.citrix.com/article/CTX112589 http://www.kb.cert.org/vuls/id/798364 http://www.securityfocus.com/bid/22762 http://www.securitytracker.com/id?1017712 http://www.vupen.com/english/advisories/2007/0784 https://exchange.xforce.ibmcloud.com/vulnerabilities/32754 •

CVSS: 7.2EPSS: 1%CPEs: 3EXPL: 1

Stack-based buffer overflow in the print provider library (cpprov.dll) in Citrix Presentation Server 4.0, MetaFrame Presentation Server 3.0, and MetaFrame XP 1.0 allows local users and remote attackers to execute arbitrary code via long arguments to the (1) EnumPrintersW and (2) OpenPrinter functions. Un desbordamiento de búfer en la región stack de la memoria en la biblioteca print provider (cpprov.dll) en Citrix Presentation Server versión 4.0, MetaFrame Presentation Server versión 3.0 y MetaFrame XP versión 1.0 permite a los usuarios locales y a los atacantes remotos ejecutar código arbitrario por medio de argumentos largos a las funciones (1) EnumPrintersW y (2) OpenPrinter. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of Citrix Presentation Server, Metaframe Presentation Server or MetaFrame XP. Authentication is not required to exploit this vulnerability. The specific flaw exists in a print provider installed by the Presentation Server. The cpprov.dll library doesn't properly handle certain invalid calls to the EnumPrintersW() and OpenPrinter() functions. • https://www.exploit-db.com/exploits/3204 http://osvdb.org/32958 http://secunia.com/advisories/23869 http://securitytracker.com/id?1017553 http://support.citrix.com/article/CTX111686 http://www.securityfocus.com/archive/1/458002/100/0/threaded http://www.securityfocus.com/bid/22217 http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c http://www.vupen.com/english/advisories/2007/0328 http://www.zerodayinitiative.com/advisories/ZDI-07-006.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 13%CPEs: 1EXPL: 3

Heap-based buffer overflow in the SendChannelData function in wfica.ocx in Citrix Presentation Server Client before 9.230 for Windows allows remote malicious web sites to execute arbitrary code via a DataSize parameter that is less than the length of the Data buffer. Desbordamiento de búfer basado en montón en la función SendChannelData en wfica.ocx de Citrix Presentation Server Client versiones anteriores a 9.230 para Windows permite a sitios web remotos maliciosos ejecutar código de su elección mediante un parámetro DataSize que es menor que la longitud del búfer Data. • https://www.exploit-db.com/exploits/5106 http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf http://secunia.com/advisories/23246 http://securityreason.com/securityalert/1995 http://securitytracker.com/id?1017343 http://support.citrix.com/article/CTX111827 http://www.citrix.com/English/SS/downloads/downloads.asp?dID=2755 http://www.kb.cert.org/vuls/id/210969 http://www.securityfocus.com/archive/1/453760/100/0/threaded http://www.securityfocus.com/bid/21458 h •

CVSS: 5.0EPSS: 48%CPEs: 4EXPL: 0

The Independent Management Architecture (IMA) service (ImaSrv.exe) in Citrix MetaFrame XP 1.0 and 2.0, and Presentation Server 3.0 and 4.0, allows remote attackers to cause a denial of service (service exit) via a crafted packet that causes the service to access an unmapped memory address and triggers an unhandled exception. El servicio (ImaSrv.exe) del Independent Management Architecture (IMA) en el Citrix MetaFrame XP 1.0 y 2.0, and Presentation Server 3.0 y 4.0, permite a atacantes remotos provocar una denegación de servicio (salida del servicio) mediante un paquete manipulado que provoca que el servicio acceda a una dirección de memoria sin mapear y dispare una excepción inmanejable. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=441 http://secunia.com/advisories/22802 http://securitytracker.com/id?1017205 http://support.citrix.com/article/CTX111186 http://www.securityfocus.com/bid/20986 http://www.vupen.com/english/advisories/2006/4429 https://exchange.xforce.ibmcloud.com/vulnerabilities/30156 •

CVSS: 7.5EPSS: 36%CPEs: 5EXPL: 0

Heap-based buffer overflow in the IMA_SECURE_DecryptData1 function in ImaSystem.dll for Citrix MetaFrame XP 1.0 and 2.0, and Presentation Server 3.0 and 4.0, allows remote attackers to execute arbitrary code via requests to the Independent Management Architecture (IMA) service (ImaSrv.exe) with invalid size values that trigger the overflow during decryption. Desbordamiento del búfer basado en montón en la función IMA_SECURE_DecryptData1 en la ImaSystem.dll para el Citrix MetaFrame XP 1.0 y 2.0, y Presentation Server 3.0 y 4.0, permite a atacantes remotos ejecutar código de su elección mediante una petición en el Independent Management Architecture (IMA) al servicio (ImaSrv.exe) con tamaños de valores no válidos que disparen el desbordamiento durante la desencriptación. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Citrix MetaFrame Presentation Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the routine IMA_SECURE_DecryptData1() defined in ImaSystem.dll and is reachable through the Independant Management Architecture (IMA) service (ImaSrv.exe) that listens on TCP port 2512 or 2513. The encryption scheme used is reversible and relies on several 32-bit fields indicating the size of the packet and the offsets to the authentication strings. • http://secunia.com/advisories/22802 http://securitytracker.com/id?1017205 http://support.citrix.com/article/CTX111186 http://www.securityfocus.com/archive/1/451337/100/100/threaded http://www.securityfocus.com/bid/20986 http://www.vupen.com/english/advisories/2006/4429 http://www.zerodayinitiative.com/advisories/ZDI-06-038.html https://exchange.xforce.ibmcloud.com/vulnerabilities/30148 •