SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Encryption/VPN)  >   Citrix NetScaler Vendors:   Citrix
(Citrix Issues Fix for Citrix NetScaler) OpenSSL Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code
SecurityTracker Alert ID:  1036827
SecurityTracker URL:  http://securitytracker.com/id/1036827
CVE Reference:   CVE-2015-1788, CVE-2015-1789, CVE-2015-1792   (Links to External Site)
Date:  Sep 15 2016
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions on the target system. A remote authenticated user may be able to execute arbitrary code on the target system. Citrix NetScaler is affected.

A remote authenticated user can send specially crafted application data to a connected DTLS peer between the ChangeCipherSpec and Finished messages to trigger an invalid memory free and cause a segmentation fault or memory corruption error and potentially execute arbitrary code [CVE-2014-8176]. Versions 0.9.8 prior to 0.9.8za, 1.0.0 prior to 1.0.0m, and 1.0.1 prior to 1.0.1h are affected.

Praveen Kariyanahalli and Ivan Fratric and Felix Groebert of Google separately reported this vulnerability.

A remote user can send specially crafted ECParameters to cause the target service to enter an infinite loop [CVE-2015-1788]. Applications that process public keys, certificate requests, or certificates are affected. TLS clients and TLS servers with client authentication enabled are affected. Versions 1.0.1 and 1.0.2 are affected.

Joseph Birr-Pixton reported this vulnerability on April 6, 2015.

A remote user can create a specially crafted certificate or certificate revocation list (CRL) that, when processed by the target application, will trigger an out-of-bound memory read in X509_cmp_time() and cause a segmentation fault [CVE-2015-1789]. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled and that use custom verification callbacks may be affected.

Robert Swiecki of Google reported this vulnerability on April 8, 2015 and Hanno Bock independently reported this vulnerability on April 11, 2015.

A remote user can create specially crafted ASN.1-encoded PKCS#7 data with a missing EnvelopedContent component to trigger a null pointer dereference [CVE-2015-1790]. Applications that decrypt or parse PKCS#7 data from untrusted sources are affected. OpenSSL clients and servers are not affected. The impact was not specified.

Michal Zalewski of Google reported this vulnerability on April 18, 2015.

A remote user can create a specially crafted signedData message that specifies an unknown hash function OID to trigger an infinite loop in the CMS code [CVE-2015-1792]. Applications that verify signedData messages using the CMS code are affected.

Johannes Bauer reported this vulnerability on March 31, 2015.

Impact:   A remote user can cause the target application to crash or enter an infinite loop.

A remote authenticated user may be able to execute arbitrary code on the target system.

The impact of one vulnerability was not disclosed.

Solution:   Citrix has issued a fix for CVE-2015-1788, CVE-2015-1789, and CVE-2015-1792 for Citrix NetScaler for the Lights Out Management (LOM) component firmware.

A fix is available for the following NetScaler products:

NetScaler Application Delivery Controller (ADC)
NetScaler Gateway
NetScaler Service Delivery Appliance
CloudBridge (NetScaler SD-WAN)
Command Center Appliance
NetScaler T1 (formerly Citrix ByteMobile)

The Citrix advisory is available at:

http://support.citrix.com/article/CTX216642

Vendor URL:  support.citrix.com/article/CTX216642 (Links to External Site)
Cause:   Access control error, Boundary error, Not specified, State error

Message History:   This archive entry is a follow-up to the message listed below.
Jun 11 2015 OpenSSL Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC