Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2014.0843 Vulnerability in Citrix VDI-In-A-Box could result in authentication bypass 29 May 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Citrix VDI-In-A-Box Publisher: Citrix Operating System: VMware ESX Server Citrix XenServer Windows Server 2008 with Hyper-V Impact/Access: Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-3780 Original Bulletin: http://support.citrix.com/article/CTX140779 - --------------------------BEGIN INCLUDED TEXT-------------------- Vulnerability in Citrix VDI-In-A-Box could result in authentication bypass CTX140779 Created On May 27, 2014 Updated On May 27, 2014 Security Bulletin Severity: High Description of Problem A vulnerability has been identified in Citrix VDI-in-a-Box that could allow unauthenticated access to VDI instances. This vulnerability is present in all versions of Citrix VDI-in-a-Box version 5.3.x up to and including 5.3.7 and 5.4.x up to and including version 5.4.3. Older versions may also be affected by this vulnerability. This vulnerability has been assigned the following CVE number: * CVE-2014-3780: Authentication bypass vulnerability in Citrix VDI-in-a-Box Java servlet What Customers Should Do This vulnerability has been addressed in Citrix VDI-in-a-Box versions 5.3.8 and later and version 5.4.4 and later. Citrix recommends that customers upgrade their VDI-in-a-Box deployments to these versions. These upgrades can be obtained from the following location: Citrix VDI in a Box: Version 5.4.4: https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-54 Version 5.3.8: https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-53 A MyCitrix login is required to access these files. Further information on how to apply the upgrades can be found in the following document: CTX140490 VDI-in-a-Box Hotfix Upgrades What Citrix Is Doing Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/. Obtaining Support on This Issue If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at http://www.citrix.com/site/ss/supportContacts.asp. Reporting Security Vulnerabilities to Citrix Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 Reporting Security Issues to Citrix Applicable Products VDI-in-a-Box 5.3 VDI-in-a-Box 5.4 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU4bDshLndAQH1ShLAQLpaA//ahXS7jgeM0OuFqHty+Lje6hXb70aoLAY 4L+T0IYX8RVboboLqY6aF3hXKxTyQCsx2rigsTPWjpuTdrplW4Iyki/zqCX13N5A T+NPoAAcm1hGfFQc5EOasWH1TvlJNFn15GSha1K43WxG7a7lUf1zhWR0j22cVHWi to3xiClixyYWLRV8tjHq/W9CKsO2erhgBE0yJ+L6YZIh+oCNo2ngCQaAnOOVHfEy RY3fBtVjIyLqunhXSjysNJnwtVOtOk1F2yo/7qSZC+BoguFTQIdfSaH9GPoEHwj7 dRXYTNf17F3iXRROyZFhqwQ1HIMkkDijAHe+jPJUV5qshKB5feGvbMPpneAD3DVn 0zNYBwo7q0fDFkz/CVNqvnqFzSMsz4Sn1Vf3wbx9ZNZHQ3oh05WMTlIQfEIXLn/m RWo7EXQlqZKSKs5wck1KCIDgerNxZo3o4VjOPOchM9oVEs5XlzKB/sczwX+yQBIz lnIlrWCW6Y/DXmtE/xUPDEXgbNDj16nh+m0mT2DdgyFOAEP+8TnoP7ff+x5i24uG MJReWC7rkRRAFHAt0CsxQgYZJcbclJSEdVMn64+qZ1wBcYKaS0XNTMRSpyYxo2T9 IBmsTtKSHvxZiKeFR17J5QwicsO98VF5lBXSY0/aVyJ1ryXNdoeXN7Uopx4OMAdU UtuekDGRk2w= =sd4E -----END PGP SIGNATURE-----