SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Citrix XenMobile Device Manager Vendors:   Citrix
(Citrix Issues Fix for Citrix XenMobile Server) Citrix License Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1035287
SecurityTracker URL:  http://securitytracker.com/id/1035287
CVE Reference:   CVE-2015-8277   (Links to External Site)
Date:  Mar 16 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Citrix License Server. A remote user can execute arbitrary code on the target system. Citrix XenMobile Server is affected.

A remote user can send specially crafted data to trigger a stack overflow and execute arbitrary code on the target system. The code will run with the privileges of the target service.

The vulnerability resides in the 3rd party FlexNet Publisher (License Manager) component.

The original advisory is available at:

http://securitymumblings.blogspot.com/2016/02/cve-2015-8277.html

@ruddawg26 reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   Citrix has issued a fix for Citrix License Server, which is a vulnerable component of XenMobile Device Manager version 9.0 and XenMobile Server versions 10.0.x, 10.1.x, and 10.3.x.

The Citrix advisory is available at:

http://support.citrix.com/article/CTX207824

Vendor URL:  support.citrix.com/article/CTX207824 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (2008), Windows (2012)

Message History:   This archive entry is a follow-up to the message listed below.
Mar 15 2016 Citrix License Server Buffer Overflow Lets Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC