Vulnerability Details : CVE-2010-2991
The IICAClient interface in the ICAClient library in the ICA Client ActiveX Object (aka ICO) component in Citrix Online Plug-in for Windows for XenApp & XenDesktop before 12.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document that triggers the reading of a .ICA file.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-2991
Probability of exploitation activity in the next 30 days: 4.30%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2991
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2010-2991
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2991
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=875
-
http://support.citrix.com/article/CTX125976
Vulnerability in Citrix XenApp Online Plug-in for Windows Could Result in Arbitrary Code ExecutionPatch;Vendor Advisory
Products affected by CVE-2010-2991
- cpe:2.3:a:citrix:online_plug-in_for_windows_for_xenapp_\&_xendesktop:*:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:online_plug-in_for_windows_for_xenapp_\&_xendesktop:11.1:*:*:*:*:*:*:*