CERTA-2006-AVI-505
Vulnerability from certfr_avis
De multiples vulnérabilités dans le produit Citrix Access Gateway permettent de contourner la politique de sécurité.
Description
Deux vulnérabilités présentes dans le processus d'authentification ainsi que dans l'utilisation de la fonctionnalité Browser-Only d'Access Gateway Enterprise 4.0 et d'Access Gateway 4.2 Advanced Edition permettent à un utilisateur malintentionné d'accéder à des ressources en contournant la politique de sécurité.
Une vulnérabilité présente dans Access Gateway appliance permet à un utilisateur distant, qui n'est pas authentifié, de compromettre l'intégrité du produit.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Access Gateway Enterprise 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Access Gateway appliance 4.2x avec les versions 4.2 et 4.5 d\u0027Access Gateway Advanced Edition.",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Access Gateway 4.2 Advanced Edition ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans le processus d\u0027authentification ainsi\nque dans l\u0027utilisation de la fonctionnalit\u00e9 Browser-Only d\u0027Access\nGateway Enterprise 4.0 et d\u0027Access Gateway 4.2 Advanced Edition\npermettent \u00e0 un utilisateur malintentionn\u00e9 d\u0027acc\u00e9der \u00e0 des ressources en\ncontournant la politique de s\u00e9curit\u00e9.\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente dans Access Gateway appliance permet \u00e0 un\nutilisateur distant, qui n\u0027est pas authentifi\u00e9, de compromettre\nl\u0027int\u00e9grit\u00e9 du produit.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2006-11-17T00:00:00",
"last_revision_date": "2006-11-17T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 CITRIX CTX111615 du 14 novembre 2006 :",
"url": "http://support.citrix.com/article/CTX111615"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 CITRIX CTX111695 du 14 novembre 2006 :",
"url": "http://support.citrix.com/article/CTX111695"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 CITRIX CTX111614 du 14 novembre 2006 :",
"url": "http://support.citrix.com/article/CTX111614"
}
],
"reference": "CERTA-2006-AVI-505",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2006-11-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans le produit Citrix Access Gateway\npermettent de contourner la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Citrix Access Gateway",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Citrix",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…