{"vuid":"VU#412228","idnumber":"412228","name":"Citrix Presentation Server heap based buffer overflow","keywords":["Citrix Presentation Server","buffer overflow","IMA service","ImaSrv.exe","port 2512/TCP","2513/TCP"],"overview":"A heap-based buffer overflow in Citrix Presentation Server may allow a remote attacker to execute arbitrary code on an vulnerable system in the context of the system user.","clean_desc":"Citrix Presentation Server is an application delivery system providing access to users accross a network. Presentation Server includes the Independent Management Architecture (IMA) service, which is responsible for the deployment of applications, policies, and other resources of remote hosts. The IMA service (ImaSrv.exe) listens by default on 2512/tcp or 2513/tcp. The service contains a boundary error which can be exploited by an attacker by sending a maliciously crafted packet to port 2512/tcp or 2513/tcp to initiate the buffer overflow.","impact":"By sending a maliciously crafted packet to port 2512/tcp or 2513/tcp, a remote attacker could execute arbitrary code on an vulnerable system in the context of the system user.","resolution":"Apply the updates to this vulnerability as provided in Citrix Knowledge Center Article CTX114487.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Eric Detoisien and reported via \nTippingPoint/ZDI","author":"This document was written by Joseph W. Pruszynski.","public":["http://support.citrix.com/article/CTX114487","http://www.zerodayinitiative.com/advisories/ZDI-08-002.html","http://secunia.com/advisories/28508/"],"cveids":["CVE-2008-0356"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-01-18T15:02:21Z","publicdate":"2008-01-17T00:00:00Z","datefirstpublished":"2008-01-22T21:52:14Z","dateupdated":"2008-01-23T02:06:35Z","revision":19,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"9","cam_exploitation":"1","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"11","cam_easeofexploitation":"5","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.33125","cam_scorecurrentwidelyknown":"7.734375","cam_scorecurrentwidelyknownexploited":"13.6125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.33125,"vulnote":null}