-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1278
               Citrix XenClient XT Multiple Security Updates
                             13 September 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           XenServer
Publisher:         Citrix
Operating System:  Citrix XenServer
Impact/Access:     Root Compromise                 -- Existing Account
                   Execute Arbitrary Code/Commands -- Existing Account
                   Increased Privileges            -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-2601 CVE-2013-2196 CVE-2013-2195
                   CVE-2013-2194 CVE-2013-1432 CVE-2013-0231
                   CVE-2013-0217 CVE-2013-0216 

Reference:         ESB-2013.0931
                   ESB-2013.0884
                   ESB-2013.0693
                   ESB-2013.0645
                   ESB-2013.0539
                   ESB-2013.0299
                   ESB-2013.0283

Original Bulletin: 
   http://support.citrix.com/article/CTX138633

- --------------------------BEGIN INCLUDED TEXT--------------------

Citrix XenClient XT Multiple Security Updates

Document ID: CTX138633
Created On: Aug 28, 2013
Updated On: Aug 28, 2013

Severity: Medium

Description of Problem

A number of security vulnerabilities have been identified in Citrix XenClient 
XT. These vulnerabilities affect all currently supported versions of Citrix 
XenClient XT up to and including version 3.1.3.

The following vulnerabilities have been addressed:
- - CVE-2013-0216 & CVE-2013-0217: Linux netback DoS via malicious guest ring
- - CVE-2013-0231: Linux pciback DoS via not rate limited log messages
- - CVE-2013-1432: Page reference counting error
- - CVE-2013-2194, CVE-2013-2195 & CVE-2013-2196: Arbitrary code injection into 
the toolstack from PV guests
- - CVE-2013-2601: User can execute arbitrary commands within the NDVM by 
creating network connections in the UIVM
- - INTEL-SA-00035: SINIT Authenticated Code Module Privilege Escalation

What Customers Should Do

New versions of Citrix XenClient XT have been released to address these issues. 
Citrix recommends that customers using Citrix XenClient XT identify and deploy 
these new versions.

Citrix XenServer 3.1.3 and earlier:
XenClient XT version 3.1.4 may be downloaded from 
http://www.citrix.com/downloads/xenclient/product-software/xenclient-xt-314.html

Citrix XenServer 2.1.2 and earlier:
XenClient XT version 2.1.3 may be downloaded from 
http://www.citrix.com/downloads/xenclient/product-software/xenclient-xt-213.html

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential 
security issue. This article is also available from the Citrix Knowledge 
Center at http://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix 
Technical Support. Contact details for Citrix Technical Support are available 
at http://www.citrix.com/site/ss/supportContacts.asp.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any 
and all potential vulnerabilities seriously. If you would like to report a 
security issue to Citrix, please compose an e-mail to secure@citrix.com stating 
the exact version of the product in which the vulnerability was found and the 
steps needed to reproduce the vulnerability.

This document applies to:

XenClient XT 3

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YbH4
-----END PGP SIGNATURE-----