CVE-2011-2592
Citrix Access Gateway Plug-in for Windows nsepacom Buffer Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a long CSEC HTTP response header.
Desbordamiento de buffer basado en memoria dinámica en el método StartEpa en el control nsepacom ActiveX (nsepa.exe) en Citrix Access Gateway Enterprise Edition Plug-in para Windows 9.x anterior a 9.3-57.5 y 10.0 anterior a 10.0-69.4 permite a atacantes remotos ejecutar código arbitrario a través de una cabecera larga de respuesta CSEC HTTP.
Secunia Research has discovered a vulnerability in Citrix Access Gateway Plug-in for Windows, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error in the nsepacom ActiveX control (nsepa.exe) when processing HTTP responses based on the request via the "StartEpa()" method. This can be exploited to cause a heap-based buffer overflow via an overly long "CSEC" HTTP response header. Successful exploitation allows execution of arbitrary code. Citrix Access Gateway Plug-in for Windows version 9.3.49.5 is affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-06-29 CVE Reserved
- 2012-08-01 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-08/0009.html | Mailing List | |
http://osvdb.org/show/osvdb/84433 | Vdb Entry | |
http://secunia.com/secunia_research/2012-27 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77316 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://support.citrix.com/article/CTX134303 | 2017-08-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Citrix Search vendor "Citrix" | Access Gateway Plug-in Search vendor "Citrix" for product "Access Gateway Plug-in" | 9.0 Search vendor "Citrix" for product "Access Gateway Plug-in" and version "9.0" | enterprise, windows |
Affected
| ||||||
Citrix Search vendor "Citrix" | Access Gateway Plug-in Search vendor "Citrix" for product "Access Gateway Plug-in" | 9.1 Search vendor "Citrix" for product "Access Gateway Plug-in" and version "9.1" | enterprise, windows |
Affected
| ||||||
Citrix Search vendor "Citrix" | Access Gateway Plug-in Search vendor "Citrix" for product "Access Gateway Plug-in" | 9.2 Search vendor "Citrix" for product "Access Gateway Plug-in" and version "9.2" | enterprise, windows |
Affected
| ||||||
Citrix Search vendor "Citrix" | Access Gateway Plug-in Search vendor "Citrix" for product "Access Gateway Plug-in" | 9.3 Search vendor "Citrix" for product "Access Gateway Plug-in" and version "9.3" | enterprise, windows |
Affected
| ||||||
Citrix Search vendor "Citrix" | Access Gateway Plug-in Search vendor "Citrix" for product "Access Gateway Plug-in" | 10.0 Search vendor "Citrix" for product "Access Gateway Plug-in" and version "10.0" | enterprise, windows |
Affected
|