copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.1463 - [Win][Linux][Virtual] Citrix CloudPlatform: Unauthorised access - Existing account

Date: 28 August 2014

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1463
        Vulnerability in Citrix CloudPlatform Virtual Router could
            result in unauthorised access to network resources
                              28 August 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Citrix CloudPlatform
Publisher:         Citrix
Operating System:  Citrix XenServer
                   KVM
                   VMware ESX Server
                   Windows Server 2008 with Hyper-V
                   Linux variants
Impact/Access:     Unauthorised Access -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-6398  

Original Bulletin: 
   http://support.citrix.com/article/CTX140989

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerability in Citrix CloudPlatform Virtual Router could result in 
unauthorised access to network resources

CTX140989 / Created On Aug 26, 2014 / Updated On Aug 26, 2014

Severity: High

Description of Problem

A vulnerability has been identified in the virtual router component of Citrix
CloudPlatform, formerly known as Citrix CloudStack, that could allow 
unauthorized access to network resources.

This vulnerability has been assigned the following CVE number:

    CVE-2013-6398: Vulnerability in Citrix CloudPlatform Virtual Router could
    result in unauthorised access to network resources

This vulnerability affects the following versions of Citrix CloudPlatform:

    All versions of Citrix CloudPlatform 4.2.x earlier than 4.2.1.3

    All versions of Citrix CloudPlatform 3.x earlier than 3.0.7 patch D

Citrix CloudPlatform version 4.3 is not affected by this vulnerability.

What Customers Should Do

This vulnerability has been addressed in the following versions of Citrix 
CloudPlatform:

    Citrix CloudPlatform 4.2.1.3 and later

    Citrix CloudPlatform 3.0.7 Patch D and later

Citrix recommends strongly that customers upgrade their Citrix CloudPlatform 
deployments to these versions. These upgrades can be obtained from the 
following location:

https://www.citrix.com/downloads/cloudplatform/product-software.html

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential 
security issue. This article is also available from the Citrix Knowledge 
Center at http://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix 
Technical Support. Contact details for Citrix Technical Support are available
at http://www.citrix.com/site/ss/supportContacts.asp.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any
and all potential vulnerabilities seriously. For guidance on how to report 
security-related issues to Citrix, please see the following document: 
CTX081743 Reporting Security Issues to Citrix

Applicable Products

    CloudPlatform 3.0.7 
    
    CloudPlatform 4.2.x 
    
    CloudPlatform 4.3

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ftuW
-----END PGP SIGNATURE-----