Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

   Citrix XenServer Windows Guest Tools Denial of Service Vulnerability
                                29 May 2014


        AusCERT Security Bulletin Summary

Product:           Citrix XenServer
Publisher:         Citrix
Operating System:  Citrix XenServer
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3798  

Original Bulletin: 
   Citrix XenServer

- --------------------------BEGIN INCLUDED TEXT--------------------

Citrix XenServer Windows Guest Tools Denial of Service Vulnerability


Created On May 27, 2014

Updated On May 27, 2014

Security Bulletin

Severity: Medium

Description of Problem

Windows guest VMs with the XenServer tools installed are at risk of a 
network-based denial of service attack from systems on the same local network.
This denial of service attack may cause the Windows guest operating system to
crash and could be exploited by sending specially crafted Ethernet frames to a
vulnerable guest VM.

This vulnerability has been assigned the following CVE number:

* CVE-2014-3798: XenServer tools network-based DoS vulnerability.

This vulnerability is present in the Citrix XenServer tools included with all
versions of Citrix XenServer up to and including Citrix XenServer 6.2 SP1.

All Windows guest VMs with tools installed from versions of Citrix XenServer 
up to and including Citrix XenServer 6.2 are impacted. If Citrix XenServer 6.2
SP1 tools are installed then the impact is limited to guest VMs running 
Windows XP or Windows 2003.

Mitigating Factors

In order to exploit this issue, the attacker would have to be in a position to
send specially crafted Ethernet frames to a vulnerable guest VM.

Windows guest VMs that do not contain the XenServer tools are not affected by
this vulnerability.

What Customers Should Do

A hotfix has been released that contains an updated version of the XenServer 
tools. Customers should use their preferred method to update their guest VMs 
with the updated XenServer tools. Should a customer wish to provide an ISO 
image to their guest administrators, an appropriate ISO image is also 

Citrix strongly recommends that affected customers install this hotfix, which
can be downloaded from the following locations:

Citrix XenServer 6.2 Service Pack 1: CTX140416 Hotfix XS62ESP1003 - For 
XenServer 6.2.0 Service Pack 1

Citrix XenServer 6.2: CTX140808 Hotfix XS62E015 - For XenServer 6.2.0

Citrix XenServer 6.1: CTX140807 Hotfix XS61E038 - For XenServer 6.1.0

Citrix XenServer 6.0.2: CTX140806 Hotfix XS602E031 - For XenServer 6.0.2

Customers using Citrix XenServer 6.0.2 in the Common Criteria evaluated 
configuration should apply the following hotfix: CTX140813 Hotfix XS602ECC009
- - For XenServer 6.0.2 Common Criteria

Citrix XenServer 6.0.0: CTX140805 Hotfix XS60E036 - For XenServer 6.0

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential 
security issue. This article is also available from the Citrix Knowledge 
Center at http://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix 
Technical Support. Contact details for Citrix Technical Support are available
at http://www.citrix.com/site/ss/supportContacts.asp.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any
and all potential vulnerabilities seriously. For guidance on how to report 
security-related issues to Citrix, please see the following document: 
CTX081743 Reporting Security Issues to Citrix.

Applicable Products

    XenServer 6.0

    XenServer 6.0.2

    XenServer 6.0.2 Common Criteria

    XenServer 6.1.0

    XenServer 6.2.0

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967