-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1688
 Buffer Overflow Vulnerability in Citrix ADC and Citrix NetScaler Gateway
                                14 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Citrix ADC
                   Citrix NetScaler Gateway
Publisher:         Citrix
Operating System:  Network Appliance
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-12044  

Original Bulletin: 
   https://support.citrix.com/article/CTX249976

- --------------------------BEGIN INCLUDED TEXT--------------------

Buffer Overflow Vulnerability in Citrix ADC and Citrix NetScaler Gateway

Reference: CTX249976

Category : Medium

Created  : 13 May 2019

Modified : 13 May 2019

Applicable Products

  o Citrix ADC
  o NetScaler Gateway

Description of Problem

A buffer overflow vulnerability has been identified in Citrix ADC and Citrix
NetScaler Gateway which could possibly result in a denial-of-service in a
specific configuration.

This vulnerability has been assigned the following CVE number:

o CVE-2019-12044: Buffer overflow vulnerability in Citrix ADC and Citrix
NetScaler Gateway

This vulnerability is present in the following versions of Citrix ADC and
Citrix NetScaler Gateway:

10.5.x earlier than version 10.5.70

11.1.x earlier than version 11.1.59.10

12.0.x earlier than version 12.0.59.8

12.1.x earlier than version 12.1.49.23

Mitigating Factors

The vulnerability can be mitigated by ensuring that virtual servers stay in the
up state, or by disabling URL redirection. Removal of the redirect URL from the
load balancer configuration mitigates this issue. In situations where failover
is still needed for a down load balancer, ensure that the redirect URL contains
at least a domain name ending with a /.

How to Configure Redirect URL on NetScaler Virtual Server When Virtual Server
is Not Available- https://support.citrix.com/article/CTX108946

What Customers Should Do

This vulnerability has been addressed in new versions of the Citrix ADC and
Citrix NetScaler Gateway software. Citrix recommends that customers upgrade
their Citrix ADC and Citrix NetScaler Gateway appliances to one of the
following versions:

11.1.59.10 and later

12.0.59.8 and later

12.1.49.23 and later

These upgrades can be obtained from the Citrix website at the following
locations:

Citrix ADC :

https://www.citrix.com/downloads/citrix-adc/

Citrix NetScaler Gateway:

https://www.citrix.com/downloads/citrix-gateway/product-software.html

The 10.5.70.x version is expected to release in the near future, until released
it is recommended to apply the configuration mitigation or upgrade to a fixed
version.

Changelog

+-------------------------------+---------------------------------------------+
|Date                           |Change                                       |
+-------------------------------+---------------------------------------------+
|13th May 2019                  |Initial publication                          |
+-------------------------------+---------------------------------------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cWSf
-----END PGP SIGNATURE-----