Friday, 5 August 2016

On 04:36 by admin   No comments
A vulnerability classified as critical was found in Citrix XenApp and XenDesktop 6.x/7.x. Affected by this vulnerability is an unknown function of the component Memory Handler. The manipulation with an unknown input leads to a privilege escalation vulnerability. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was released 08/03/2016 by Udi Yavo as CTX215460 as confirmed security bulletin (Website). The advisory is shared for download at support.citrix.com. The public release was coordinated with Citrix. This vulnerability is known as CVE-2016-6493. The attack can be launched remotely. The technical details are unknown and an exploit is not publicly available. The advisory points out:
A weakness has been identified in Citrix XenApp and XenDesktop. While this issue is not directly exploitable, it could potentially weaken an existing security mitigation, resulting in a loss of defence in depth.
Upgrading to version 7.9 eliminates this vulnerability. Applying the patch 6.5 HRP07 is able to eliminate this problem. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at SecurityTracker (ID 1036539).

CVSSv3

Base Score: ≈6.3 
Temp Score: ≈6.0 
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C 
Reliability: Medium

CVSSv2

Base Score: ≈6.0 (CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P) 
Temp Score: ≈5.2 (CVSS2#E:ND/RL:OF/RC:C) 
Reliability: Medium

CPE

Exploiting

Class: Privilege escalation
Local: No
Remote: Yes


Countermeasures

Recommended: Upgrade
Status: Official fix
Reaction Time: 0 days since reported
0-Day Time: 0 days since found
Exposure Time: 0 days since known

Upgrade: XenApp/XenDesktop 7.9
Patch: 6.5 HRP07

0 comments:

Post a comment