News & Media
Become a member »
» ESB-2012.0184 - [Win] Citrix XenServer Web Self Serv...
ESB-2012.0184 - [Win] Citrix XenServer Web Self Service: Reduced security - Unknown/unspecified
17 February 2012
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0184 Multiple Vulnerabilities in Citrix XenServer Web Self Service 17 February 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Citrix XenServer Web Self Service Publisher: Citrix Operating System: Windows Impact/Access: Reduced Security -- Unknown/Unspecified Resolution: Patch/Upgrade Original Bulletin: http://support.citrix.com/article/CTX132219 - --------------------------BEGIN INCLUDED TEXT-------------------- Multiple Vulnerabilities in Citrix XenServer Web Self Service Document ID: CTX132219 Created On: 15-Feb-2012 Updated On: 15-Feb-2012 Average Rating: not yet rated Severity: Medium Description of Problem A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. These vulnerabilities affect all currently supported versions of Web Self Service prior to version 1.1.1. Mitigating Factors Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. What Customers Should Do These vulnerabilities have been addressed in a new version of the Web Self Service virtual appliance. Citrix recommends that customers using Web Self Service upgrade their virtual appliance to version 1.1.1. The new version of the Web Self Service virtual appliance can be obtained from the following location: http://www.citrix.com/English/ss/downloads/details.asp?downloadId=2313062&productId=683148 Acknowledgements Citrix thanks Maxin Tsoy, Kirill Mosolov and Ilya Smith of Positive Research Center (http://www.ptsecurity.com/) for working with us to protect Citrix customers. What Citrix Is Doing Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/. Obtaining Support on This Issue If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at http://www.citrix.com/site/ss/supportContacts.asp. Reporting Security Vulnerabilities to Citrix Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. If you would like to report a security issue to Citrix, please compose an e-mail to email@example.com stating the exact version of the product in which the vulnerability was found and the steps needed to reproduce the vulnerability. This document applies to: XenServer 5.5 XenServer 5.6 XenServer 5.6 FP 1 XenServer 5.6 SP 2 XenServer 6.0 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to firstname.lastname@example.org and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBTz3Biu4yVqjM2NGpAQJ31A/+KU99ZCwOITMztyvoxUQGBR0D63IGliTo H28kZDu/b3Q6ZgNimc7J9U0KEREmHGkMqp7q/B982MHV59p/OMb26++05x+YzW35 qiNebVZ26Jvhnr0g7S/SATX639Je6d+zTrUgSCwxJ1pK3uaEYR/RWSVFzstVG06P Ka0MHdXoPMcB2i+RuJIHWE+5JkRu5BjUBziQ5+Kmkk8Z9OKQEb1EApA+1+Wxs2dT P5opTAq3bm2g8MMa2gplpHMcYiPnReXsB4fyLmOj/uTtr215VSNGzqyO/PWO5+Ag alQ3JHc141FCXe+NHzTTUOg+3k6/mqFEqag6fDx18SxA3bzufU0lz8YyLJTqUZ8a ONknIcKx8DG/6L0H0UCpgWX0F+DZ1KKUFXbfl87jc946FtabUbgjcCAztYkdbbfk vQl6xRYKkNrs/WFBCDSqjawTq8aLB+P6yTIEelUr9Fj4P9+bnoF3aDq6j1XqsmlN PexRMetIW5yiVPO1KKsgovxv7wRrCHOhYHDVXEhHuYaWqLoEBpP1T4l3siGjoUm7 FmEtrpJaqZZGvHh15UYFOuJWjZHNODhhaatgnarfHNWisTQDci5ywZpEy2Tx57Eu UYiszOXlMP4YOmcm20ZFPq950mXfK1+irspJD7MmAPluaXUo2bPKXQuU6lnI+V3L VQSWNS0OG0c= =PZpa -----END PGP SIGNATURE-----
Comments? Click here