Lucene search

K
openvasCopyright (C) 2016 Greenbone AGOPENVAS:1361412562310105538
HistoryFeb 11, 2016 - 12:00 a.m.

Citrix NetScaler Application Delivery Controller and NetScaler Gateway Multiple Security Updates (CTX206001)

2016-02-1100:00:00
Copyright (C) 2016 Greenbone AG
plugins.openvas.org
250

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.9%

A number of vulnerabilities have been identified in Citrix
NetScaler Application Delivery Controller (ADC) and NetScaler Gateway that could allow a
malicious, unprivileged user to perform privileged operations or execute commands.

# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:citrix:netscaler";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105538");
  script_version("2023-07-28T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-07-28 05:05:23 +0000 (Fri, 28 Jul 2023)");
  script_tag(name:"creation_date", value:"2016-02-11 17:00:25 +0100 (Thu, 11 Feb 2016)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2016-12-03 03:24:00 +0000 (Sat, 03 Dec 2016)");

  script_cve_id("CVE-2016-2071", "CVE-2016-2072");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Citrix NetScaler Application Delivery Controller and NetScaler Gateway Multiple Security Updates (CTX206001)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2016 Greenbone AG");
  script_family("General");
  script_dependencies("gb_citrix_netscaler_consolidation.nasl");
  script_mandatory_keys("citrix/netscaler/detected");

  script_tag(name:"summary", value:"A number of vulnerabilities have been identified in Citrix
  NetScaler Application Delivery Controller (ADC) and NetScaler Gateway that could allow a
  malicious, unprivileged user to perform privileged operations or execute commands.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - CVE-2016-2071: Citrix NetScaler Application Delivery Controller and NetScaler Gateway Command
  Privilege Elevation Vulnerability Through Un-sanitised NS Web GUI Commands.

  - CVE-2016-2071: Citrix NetScaler Application Delivery Controller and NetScaler Gateway Command
  Privilege Elevation Vulnerability Through Un-sanitised NS Web GUI Commands.");

  script_tag(name:"affected", value:"Citrix NetScaler version 11.0 earlier than 11.0 Build 64.34,
  10.5 earlier than 10.5 Build 59.13 and 10.5.e earlier than 10.5.e Build 59.1305.e.

  All builds of version 10.1 are affected by CVE-2016-2072 only. CVE-2016-2071 does not affect
  version 10.1.");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_xref(name:"URL", value:"https://support.citrix.com/article/CTX206001");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! vers = get_app_version( cpe:CPE, nofork: TRUE ) )
  exit( 0 );

if( get_kb_item( "citrix/netscaler/enhanced_build" ) )
  enhanced = TRUE;

if( enhanced ) {
  if( version_in_range( version:vers, test_version:"10.5", test_version2:"10.5.59.1304" ) ) {
    fix = "10.5.e Build 59.1305.e";
    vers = vers + ".e";
  }
}
else {
  if( version_in_range( version:vers, test_version:"10.5", test_version2:"10.5.59.12" ) )
    fix = "10.5 Build 59.13";

  if( version_in_range( version:vers, test_version:"10.1", test_version2:"10.1.133.8" ) )
    fix = "10.1 build 133.9";

  if( version_in_range( version:vers, test_version:"11.0", test_version2:"11.0.64.33" ) )
    fix = "11.0 Build  64.34";
}

if( fix ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:fix );
  security_message( port:0, data:report );
  exit( 0 );
}

exit( 99 );

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.9%

Related for OPENVAS:1361412562310105538