Vulnerability Details : CVE-2011-2593
Integer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a crafted Content-Length HTTP header, which triggers a heap-based buffer overflow.
Vulnerability category: OverflowExecute code
Products affected by CVE-2011-2593
- Citrix » Access Gateway Plug-in » Update 49-5 Enterprise Edition For WindowsVersions up to, including, (<=) 9.3cpe:2.3:a:citrix:access_gateway_plug-in:*:49-5:*:*:enterprise:windows:*:*
- cpe:2.3:a:citrix:access_gateway_plug-in:10.0:*:*:*:enterprise:windows:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-2593
5.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2593
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-2593
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2593
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/77317
Citrix Access Gateway Plug-in for Windows ActiveX control buffer overflow CVE-2011-2593 Vulnerability Report
-
http://support.citrix.com/article/CTX134303
Vulnerabilities in Citrix Access Gateway Enterprise Edition Plug-in for Windows could result in arbitrary code executionPatch;Vendor Advisory
Jump to