-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0485
Vulnerability in Citrix VDI-in-a-Box Could Result in Credential Disclosure
                               10 April 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Citrix VDI-in-a-Box
Publisher:         Citrix
Operating System:  VMware ESX Server
                   Citrix XenServer
                   Windows Server 2008 with Hyper-V
Impact/Access:     Reduced Security -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-2690  

Original Bulletin: 
   http://support.citrix.com/article/CTX140106

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerability in Citrix VDI-in-a-Box Could Result in Credential Disclosure

CTX140106  

Created On  Apr 08, 2014  
Updated On  Apr 08, 2014

Security Bulletin

See Applicable Products

Severity: High

Description of Problem

A vulnerability has been identified in Citrix VDI-in-a-Box that could result 
in administrator credentials being logged to disk.

This vulnerability affects Citrix VDI-in-a-Box version 5.3.x up to and 
including 5.3.5 and version 5.4.x up to and including 5.4.1. Older versions of 
Citrix VDI-in-a-Box are not affected by this vulnerability.

This vulnerability has been assigned the following CVE number:
- - CVE-2014-2690: Vulnerability in Citrix VDI-in-a-Box Could Result in 
Credential Disclosure

What Customers Should Do

This vulnerability has been addressed in Citrix VDI-in-a-Box versions 5.3.6 
and later and version 5.4.2 and later. Citrix recommends that customers 
upgrade their VDI-in-a-Box deployments to these versions. These upgrades can 
be obtained from the following location:
Citrix VDI in a Box:
Version 5.4.3: https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-543
Version 5.3.6: https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-53

A MyCitrix login is required to access these files.

Further information on how to apply the upgrades can be found in the following 
document :
CTX140490 – VDI-in-a-Box Hotfix Upgrades

Citrix strongly recommends that, following the upgrade and image revision 
process, customers consider changing the credentials of the administrator used 
to import and prepare the desktop images.

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential 
security issue. This article is also available from the Citrix Knowledge 
Center at http://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix 
Technical Support. Contact details for Citrix Technical Support are available 
at http://www.citrix.com/site/ss/supportContacts.asp.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any 
and all potential vulnerabilities seriously. If you would like to report a 
security issue to Citrix, please compose an e-mail to secure@citrix.com 
stating the exact version of the product in which the vulnerability was found 
and the steps needed to reproduce the vulnerability.

Applicable Products
VDI-in-a-Box 5.2
VDI-in-a-Box 5.3
VDI-in-a-Box 5.4

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=vOk4
-----END PGP SIGNATURE-----