{"vuid":"VU#555220","idnumber":"555220","name":"Citrix Access Gateway appliances vulnerable to information disclosure","keywords":["Citrix","Access Gateway appliances","Advanced Access Control","information disclosure"],"overview":"A vulnerability exists in Citrix Access Gateway appliances that may allow an attacker to access data and compromise the system.","clean_desc":"Citrix Access Gateway products are universal SSL VPN appliances providing a secure, always-on, single point-of-access to an organization's applications and data. Some versions can be configured to have administrative and access control policy functions centralized in configurations using Advanced Access Control with an Access Gateway appliance. According to Citrix: When using Advanced Access Control with an Access Gateway appliance, unauthenticated remote users may be able to gain access to data on the Access Gateway appliance. The information disclosed could potentially lead to a compromise of the appliance. This vulnerability affects the following products: • Access Gateway 4.5 Advanced Edition\n      • Access Gateway 4.2 with Advanced Access Control 4.2 (currently known as Access Gateway 4.2 Advanced Edition)\nWhen deployed with: • Access Gateway appliance 4.2\n      • Access Gateway appliance 4.2.1\n      • Access Gateway appliance 4.2.2\nAccess Gateway appliances deployed without Advanced Access Control are not vulnerable to this issue.","impact":"A remote, unauthenticated attacker may be able to gain access to sensitive data from an affected device. This information disclosure could supplement additional attacks and potentially lead to a compromise of the affected device.","resolution":"Apply an Update Citrix has released product updates that address this issue. Please see Citrix document CTX111695 for further information.","workarounds":"","sysaffected":"","thanks":"This issue was reported in Citrix document  \nCTX111695\n. Citrix thanks Thierry Zoller and Laurent Kempenaar for reporting the issue.","author":"This document was written by Katie Steiner.","public":["http://support.citrix.com/article/CTX111695","http://secunia.com/advisories/22908/"],"cveids":["CVE-2006-6573"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-20T21:37:37Z","publicdate":"2006-11-15T00:00:00Z","datefirstpublished":"2007-01-29T13:51:43Z","dateupdated":"2007-01-29T13:52:35Z","revision":8,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0,"vulnote":null}