-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.0184
       Multiple Vulnerabilities in Citrix XenServer Web Self Service
                             17 February 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Citrix XenServer Web Self Service
Publisher:         Citrix
Operating System:  Windows
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://support.citrix.com/article/CTX132219

- --------------------------BEGIN INCLUDED TEXT--------------------

Multiple Vulnerabilities in Citrix XenServer Web Self Service

Document ID: CTX132219

Created On: 15-Feb-2012

Updated On: 15-Feb-2012

Average Rating: not yet rated

Severity: Medium

Description of Problem

A number of security vulnerabilities have been identified in the management web
interface of Citrix XenServer Web Self Service. These vulnerabilities affect
all currently supported versions of Web Self Service prior to version 1.1.1.

Mitigating Factors

Customers who have installed XenServer but have not additionally downloaded and
installed the optional Web Self Service component are not affected by these
vulnerabilities.

What Customers Should Do

These vulnerabilities have been addressed in a new version of the Web Self
Service virtual appliance. Citrix recommends that customers using Web Self
Service upgrade their virtual appliance to version 1.1.1.

The new version of the Web Self Service virtual appliance can be obtained from
the following location:
http://www.citrix.com/English/ss/downloads/details.asp?downloadId=2313062&productId=683148

Acknowledgements

Citrix thanks Maxin Tsoy, Kirill Mosolov and Ilya Smith of Positive Research
Center (http://www.ptsecurity.com/) for working with us to protect Citrix
customers.

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential
security issue. This article is also available from the Citrix Knowledge Center
at http://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix
Technical Support. Contact details for Citrix Technical Support are available
at http://www.citrix.com/site/ss/supportContacts.asp.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any
and all potential vulnerabilities seriously. If you would like to report a
security issue to Citrix, please compose an e-mail to secure@citrix.com stating
the exact version of the product in which the vulnerability was found and the
steps needed to reproduce the vulnerability.

This document applies to:

XenServer 5.5
XenServer 5.6
XenServer 5.6 FP 1
XenServer 5.6 SP 2
XenServer 6.0

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBTz3Biu4yVqjM2NGpAQJ31A/+KU99ZCwOITMztyvoxUQGBR0D63IGliTo
H28kZDu/b3Q6ZgNimc7J9U0KEREmHGkMqp7q/B982MHV59p/OMb26++05x+YzW35
qiNebVZ26Jvhnr0g7S/SATX639Je6d+zTrUgSCwxJ1pK3uaEYR/RWSVFzstVG06P
Ka0MHdXoPMcB2i+RuJIHWE+5JkRu5BjUBziQ5+Kmkk8Z9OKQEb1EApA+1+Wxs2dT
P5opTAq3bm2g8MMa2gplpHMcYiPnReXsB4fyLmOj/uTtr215VSNGzqyO/PWO5+Ag
alQ3JHc141FCXe+NHzTTUOg+3k6/mqFEqag6fDx18SxA3bzufU0lz8YyLJTqUZ8a
ONknIcKx8DG/6L0H0UCpgWX0F+DZ1KKUFXbfl87jc946FtabUbgjcCAztYkdbbfk
vQl6xRYKkNrs/WFBCDSqjawTq8aLB+P6yTIEelUr9Fj4P9+bnoF3aDq6j1XqsmlN
PexRMetIW5yiVPO1KKsgovxv7wRrCHOhYHDVXEhHuYaWqLoEBpP1T4l3siGjoUm7
FmEtrpJaqZZGvHh15UYFOuJWjZHNODhhaatgnarfHNWisTQDci5ywZpEy2Tx57Eu
UYiszOXlMP4YOmcm20ZFPq950mXfK1+irspJD7MmAPluaXUo2bPKXQuU6lnI+V3L
VQSWNS0OG0c=
=PZpa
-----END PGP SIGNATURE-----