Vulnerability In Program Neighborhood Client Could Result In Arbitrary Code Execution |
Friday, 16 December 2005
by Michel Roth
|
The Citrix Program Neighborhood client supports a UDP based application enumeration mechanism; if this functionality is used to present the client with a very long application name then an implementation flaw in the client could result in an internal buffer being overflowed. It is possible that this buffer overflow could be used to execute malicious code within the client process.
The following clients are affected by this issue:
• Citrix Program Neighborhood version 9.1 and earlier for 32-bit and 64-bit Windows
The Citrix Web client and the Citrix Program Neighborhood Agent client are not affected by this vulnerability.
Read CTX108354 here.
|