Citrix Provisioning Services is a streaming service to deliver a desktop image on-demand to physical desktops from a network service. The shared desktop image is configured, delivered, and managed centrally. Part of the Citrix Provisioning Services includes a SoapServer service.
Remote exploitation of a heap buffer overflow vulnerability in Citrix Systems Inc.'s Provisioning Services software could allow an attacker to execute arbitrary code with the privileges of the affected service.
The SoapServer service contains a vulnerability that can be triggered by an unauthenticated attacker. The SoapServer service allocates a fixed sized heap buffer for a date and time string. A buffer index pointer calculation may result in a pointer value which references a location outside the fixed sized heap buffer. This condition may result in a heap buffer overflow and can lead to arbitrary code execution.
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the affected service. To exploit this vulnerability, an attacker must be able to create a TCP connection to the SoapServer service on the targeted server. No authentication is required.
Citrix Provisioning Services versions 5.0, 5.1, 5.6, 5.6 SP1, 6.0 and 6.1 are vulnerable.
iDefense is currently unaware of any workaround for this issue.
Citrix has released hotfixes to address this vulnerability. For more information, consult their advisory at the following URL.
A Mitre Corp. Common Vulnerabilities and Exposures (CVE) number has not been assigned yet.
10/12/2011 Initial Vendor Notification
10/13/2011 Initial Vendor Reply
05/01/2012 Coordinated Public Disclosure
The discoverer of this vulnerability wishes to remain anonymous.
Get paid for vulnerability research
Free tools, research and upcoming events
Copyright © 2012 Verisign, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customer service for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.