{"vuid":"VU#658620","idnumber":"658620","name":"Citrix Access Gateway LDAP authentication bypass","keywords":["Citrix","Access Gateway","authentication bypass","LDAP authentication","user credentials"],"overview":"An error with LDAP authentication in Citrix Access Gateway appliances may allow an attacker to successfully authenticate without providing correct login credentials.","clean_desc":"Citrix Access Gateway appliances use SSL VPN technology to give remote users secure access shared resources. These appliances can authenticate users through the LDAP protocol. Citrix includes LDAP authentication as part of the Advanced Access Control (AAC) options. A unspecified vulnerability exists in Citrix Access Gateway Appliances that are using AAC version 4.2 with LDAP enabled. If successfully exploited, this vulnerability may allow an attacker to authenticate without supplying valid login credentials.","impact":"A remote attacker may be able to gain access to an internal network or shared resource.","resolution":"Apply Hotfix\nCitrix has provided a hotfix to address this issue. See Citrix Knowledge Center Document ID CTX110950 for more details.","workarounds":"Do not enable LDAP authentication\nIf another authentication method is being used, disabling LDAP authentication may mitigate the effects of this vulnerability.","sysaffected":"","thanks":"Thanks to Citrix for information about this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://support.citrix.com/article/CTX110950","http://www.citrix.com/English/ps2/products/product.asp?contentID=15005","http://secunia.com/advisories/21941/","http://securitytracker.com/alerts/2006/Sep/1016874.html"],"cveids":["CVE-2006-4846"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-10-25T20:02:46Z","publicdate":"2006-09-18T00:00:00Z","datefirstpublished":"2006-11-10T19:16:58Z","dateupdated":"2007-01-29T14:46:45Z","revision":43,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"12","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"9","cam_impact":"5","cam_easeofexploitation":"5","cam_attackeraccessrequired":"16","cam_scorecurrent":"1.1475","cam_scorecurrentwidelyknown":"1.6875","cam_scorecurrentwidelyknownexploited":"3.0375","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.1475,"vulnote":null}