{"vuid":"VU#798364","idnumber":"798364","name":"Citrix Presentation Server Client vulnerable to arbitrary code execution","keywords":["Citrix","Presentation Server Client","arbitrary code execution","ICA connections"],"overview":"A vulnerability in the Citrix Presentation Server Client could allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Independent Computing Architecture (ICA) is an application server protocol used by Citrix products. The Citrix Presentation Server Client for Windows includes support for making ICA connections through proxy servers. An unspecified implementation flaw in this functionality may allow an attacker to execute arbitrary code in the context of the client process. Citrix notes that this vulnerability is present in all versions of the Citrix Presentation Server Client for Windows earlier than 10.0.","impact":"By convincing a user to view a specially crafted web page, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user.","resolution":"Upgrade Citrix has published updated versions of the Presentation Server Client software to address this issue. Please see the Systems Affected section of this document for additional details.","workarounds":"","sysaffected":"","thanks":"Thanks to Citrix for reporting this vulnerability. Citrix, in turn, credits Karl Lynn of \nJuniper Networks\n with reporting this information to them.","author":"This document was written by Chad R Dougherty.","public":["http://support.citrix.com/article/CTX112589","http://secunia.com/advisories/24350/","http://securitytracker.com/alerts/2007/Mar/1017712.html","http://www.securityfocus.com/bid/22762"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-03-01T15:49:26Z","publicdate":"2007-03-01T00:00:00Z","datefirstpublished":"2007-03-02T20:38:48Z","dateupdated":"2007-03-07T16:07:34Z","revision":4,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"7","cam_impact":"15","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"6.3","cam_scorecurrentwidelyknown":"7.875","cam_scorecurrentwidelyknownexploited":"14.175","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.3,"vulnote":null}