===================================================================== CERT-Renater Note d'Information No. 2011/VULN035 _____________________________________________________________________ DATE : 19/01/2011 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Systems running Citrix Provisioning Services up to and including version 5.6. ====================================================================== http://support.citrix.com/article/CTX127149 ______________________________________________________________________ Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution Document ID: CTX127149 / Created On: 13 janv. 2011 / Updated On: 18 janv. 2011 Severity: High Description of Problem A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. Mitigating Factors In a typical deployment, the vulnerable component will not be accessible from the Internet. What Customers Should Do This vulnerability has been addressed in Service Pack 1 for Citrix Provisioning Services version 5.6. Citrix recommends that customers apply this service pack to their Provisioning Services 5.6 deployments. This Service Pack can be obtained from the following locations: Citrix Provisioning Services 5.6 Service Pack 1: English - http://support.citrix.com/article/CTX127153 Customers using Provisioning Services earlier than version 5.6, should apply the hotfix relevant to their deployment. These hotfixes can be found at the following locations: Citrix Provisioning Services 5.1 SP2: English - http://support.citrix.com/article/CTX127164 Japanese - http://support.citrix.com/article/CTX127166 Citrix Provisioning Services 5.1 SP1: English - http://support.citrix.com/article/CTX127155 Citrix Provisioning Services 5.1: English - http://support.citrix.com/article/CTX127175 Acknowledgements Citrix would like to thank AbdulAziz Hariri and the Zero Day Initiative (http://www.zerodayinitiative.com/) for working with us to protect Citrix customers. What Citrix Is Doing Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/. Obtaining Support on This Issue If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at http://www.citrix.com/site/ss/supportContacts.asp. Reporting Security Vulnerabilities to Citrix Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. If you would like to report a security issue to Citrix, please compose an e-mail to secure@citrix.com stating the exact version of the product in which the vulnerability was found and the steps needed to reproduce the vulnerability This document applies to: * Provisioning Server 5.1 * Provisioning Services 5.6 ====================================================================== ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================