21 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Untrusted search path vulnerability in Citrix MetaFrame Presentation Server allows local users to gain privileges via a malicious icabar.exe placed in the search path. Vulnerabilidad de ruta de búsqueda no confiable en Citrix MetaFrame Presentation Server permite a usuarios locales conseguir privilegios a través de un icabar.exe malicioso colocado en una ruta de búsqueda. • http://securityreason.com/securityalert/4110 http://www.securityfocus.com/archive/1/494952/100/0/threaded http://www.securityfocus.com/bid/30446 https://exchange.xforce.ibmcloud.com/vulnerabilities/44490 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in Citrix Presentation Server 4.5 and earlier, Citrix Access Essentials 2.0 and earlier, and Citrix Desktop Server 1.0 allows remote authenticated users to access unauthorized desktops via unknown attack vectors. Vulnerabilidad sin especificar en Citrix Presentation Server 4.5 y anteriores, Citrix Access Essentials 2.0 y anteriores y Citrix Desktop Server 1.0 permite a atacantes autentificados remotamente acceder a escritorios no autorizados mediante vectores de ataque desconocidos. • http://secunia.com/advisories/30271 http://support.citrix.com/article/CTX116941 http://www.securityfocus.com/bid/29232 http://www.securitytracker.com/id?1020027 http://www.vupen.com/english/advisories/2008/1530/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42439 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 85%CPEs: 4EXPL: 0

Buffer overflow in the Independent Management Architecture (IMA) service in Citrix Presentation Server (MetaFrame Presentation Server) 4.5 and earlier, Access Essentials 2.0 and earlier, and Desktop Server 1.0 allows remote attackers to execute arbitrary code via an invalid size value in a packet to TCP port 2512 or 2513. Desbordamiento de búfer en el servicio Independent Management Architecture (IMA) de Citrix Presentation Server (MetaFrame Presentation Server) 4.5 y versiones anteriores, Access Essentials 2.0 y versiones anteriores, y Desktop Server 1.0 permite a atacantes remotos ejecutar código de su elección mediante un valor de tamaño inválido en un paquete al puerto TCP 2512 ó 2513. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Citrix Presentation Server. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Independent Management Architecture service, ImaSrv.exe, which listens by default on TCP port 2512 or 2513. The process trusts a user-suppled value as a parameter to a memory allocation. • http://secunia.com/advisories/28508 http://support.citrix.com/article/CTX114487 http://www.kb.cert.org/vuls/id/412228 http://www.securityfocus.com/archive/1/486585/100/0/threaded http://www.securityfocus.com/bid/27329 http://www.securitytracker.com/id?1019231 http://www.vupen.com/english/advisories/2008/0172 http://zerodayinitiative.com/advisories/ZDI-08-002.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 0

The Program Neighborhood Agent in Citrix Presentation Server Clients for 32-bit Windows before 10.100 allows remote attackers to cause a denial of service (agent exit) via a certain request that uses content redirection and a long pathname. The Program Neighborhood Agent en Citrix Presentation Server Clients para 32-bit Windows anterior a 10.100 permite a atacantes remotos provocar denegación de servicio (salida del agente) a través de ciertas respuestas que utilizan la redirección de contenido y un nombre de ruta largo. • http://osvdb.org/37839 http://secunia.com/advisories/25897 http://support.citrix.com/article/CTX113543 http://www.securityfocus.com/bid/24790 http://www.securitytracker.com/id?1018343 http://www.vupen.com/english/advisories/2007/2455 https://exchange.xforce.ibmcloud.com/vulnerabilities/35283 •

CVSS: 10.0EPSS: 6%CPEs: 8EXPL: 0

The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a modified address:port string. El Session Reliability Service (XTE) del Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0 y Access Essentials 1.0 y 1.5, permite a atacantes remotos evitar las políticas de seguridad de la red y conectarse a puertos TCP de su elección a través de una cadena address:port modificada. • http://fortconsult.net/files/fortconsult.dk/citrix_advisory.pdf http://secunia.com/advisories/25371 http://support.citrix.com/article/CTX112964 http://www.securitytracker.com/id?1018098 http://www.vupen.com/english/advisories/2007/1918 https://exchange.xforce.ibmcloud.com/vulnerabilities/34448 •