The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a modified address:port string.
Max CVSS
10.0
EPSS Score
3.94%
Published
2007-05-24
Updated
2017-07-29
Stack-based buffer overflow in the print provider library (cpprov.dll) in Citrix Presentation Server 4.0, MetaFrame Presentation Server 3.0, and MetaFrame XP 1.0 allows local users and remote attackers to execute arbitrary code via long arguments to the (1) EnumPrintersW and (2) OpenPrinter functions.
Max CVSS
7.2
EPSS Score
1.01%
Published
2007-01-24
Updated
2018-10-16
Heap-based buffer overflow in the IMA_SECURE_DecryptData1 function in ImaSystem.dll for Citrix MetaFrame XP 1.0 and 2.0, and Presentation Server 3.0 and 4.0, allows remote attackers to execute arbitrary code via requests to the Independent Management Architecture (IMA) service (ImaSrv.exe) with invalid size values that trigger the overflow during decryption.
Max CVSS
7.5
EPSS Score
36.41%
Published
2006-11-10
Updated
2018-10-17
Citrix Metaframe Presentation Server 3.0 and 4.0 allows remote attackers to bypass policy restrictions by downloading the launch.ica file and changing the client device name (ClientName).
Max CVSS
7.5
EPSS Score
0.92%
Published
2005-10-04
Updated
2018-08-13
CITRIX Metaframe 1.8 logs the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through Network Address Translation (NAT).
Max CVSS
7.5
EPSS Score
3.05%
Published
2001-11-21
Updated
2017-12-19
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Max CVSS
10.0
EPSS Score
0.41%
Published
2000-03-29
Updated
2008-09-10
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!