Lucene search

K
citrixCitrixCTX222657
HistoryApr 12, 2017 - 4:00 a.m.

CVE-2017-7219 - Heap Overflow Vulnerability in Citrix NetScaler Gateway Could Result in Arbitrary Code Execution

2017-04-1204:00:00
support.citrix.com
11

0.003 Low

EPSS

Percentile

71.7%

<section>
<div><div>
<div>

<h2> Description of Problem</h2>

<div>
<div>
<div>
<p>A heap overflow vulnerability has been identified in Citrix NetScaler Gateway that could allow a remote, authenticated user to execute arbitrary commands on the NetScaler Gateway appliance as a root user. </p>
<p>The following vulnerability has been addressed:</p>
<ul>
<li>CVE-2017-7219 (High): Heap Overflow vulnerability in Citrix NetScaler Gateway Could Result in Arbitrary Code Execution</li>
</ul>
<p>The vulnerability affects the following versions of Citrix NetScaler Gateway:</p>
<ul>
<li>Version 11.1 earlier than 11.1 Build 52.13</li>
<li>Version 11.0 earlier than 11.0 Build 70.12</li>
<li>Version 10.5 earlier than 10.5 Build 65.11</li>
<li>Version 10.1 earlier than 10.1 Build 135.8/135.12</li>
</ul>
<p>Please note that deployments of Citrix NetScaler ADC and NetScaler Web Application Firewall (WAF) that include an enabled NetScaler Gateway instance are affected by this vulnerability. </p>
<p>In deployments where NetScaler Gateway is deployed in ICA Proxy Mode only, the vulnerability does not affect the appliance firmware.</p>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> What Customers Should Do</h2>

<div>
<div>
<div>
<p>This vulnerability has been addressed in the following versions of Citrix NetScaler Gateway:</p>
<ul>
<li>Citrix NetScaler Gateway version 11.1 Build 52.13 and later</li>
<li>Citrix NetScaler Gateway version 11.0 Build 70.12 and later</li>
<li>Citrix NetScaler Gateway version 10.5 Build 65.11 and later</li>
<li>Citrix NetScaler Gateway version 10.1 Build 135.8/135.12 and later </li>
</ul>
<p>These new versions can be downloaded from the following location:</p>
<p> <a href=“https://www.citrix.com/downloads/netscaler-gateway.html”>https://www.citrix.com/downloads/netscaler-gateway.html</a></p>
<p>Citrix strongly recommends that customers using affected versions of NetScaler Gateway upgrade to a version of the appliance firmware that contains the fixes for this issue as soon as possible.</p>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> Acknowledgements</h2>

<div>
<div>
<div>
<p>Citrix thanks Alain Mowat of SCRT (<a href=“https://www.scrt.ch”>https://www.scrt.ch</a>) for working with us to protect Citrix customers.</p>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> What Citrix Is Doing</h2>

<div>
<div>
<div>
<div>
<div>
<p>Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at <u> <a href=“http://support.citrix.com/”>http://support.citrix.com/</a></u>.</p>
</div>
</div>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> Obtaining Support on This Issue</h2>

<div>
<div>
<div>
<div>
<div>
<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=“https://www.citrix.com/support/open-a-support-case.html”>https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>
</div>
</div>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> Reporting Security Vulnerabilities</h2>

<div>
<div>
<div>
<div>
<div>
<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – <a href=“http://support.citrix.com/article/CTX081743”>Reporting Security Issues to Citrix</a></p>
</div>
</div>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> Changelog</h2>

<div>
<div>
<div>
<table border=“1” width=“100%”>
<tbody>
<tr>
<td>Date </td>
<td>Change</td>
</tr>
<tr>
<td>12th April 2017</td>
<td>Initial Publishing</td>
</tr>
<tr>
<td>21st April 2017</td>
<td>Update to Description of Problem</td>
</tr>
<tr>
<td>9th May 2017</td>
<td>Update to Description of Problem</td>
</tr>
<tr>
<td>30th May 2017</td>
<td>Update to Description of Problem </td>
</tr>
</tbody>
</table>
</div>
</div>
</div>

<hr />
</div>
</div></div>
</section>

0.003 Low

EPSS

Percentile

71.7%