-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0843
Vulnerability in Citrix VDI-In-A-Box could result in authentication bypass
                                29 May 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Citrix VDI-In-A-Box
Publisher:         Citrix
Operating System:  VMware ESX Server
                   Citrix XenServer
                   Windows Server 2008 with Hyper-V
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3780  

Original Bulletin: 
   http://support.citrix.com/article/CTX140779

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerability in Citrix VDI-In-A-Box could result in authentication bypass

CTX140779

Created On May 27, 2014

Updated On May 27, 2014

Security Bulletin

Severity: High

Description of Problem

A vulnerability has been identified in Citrix VDI-in-a-Box that could allow 
unauthenticated access to VDI instances.

This vulnerability is present in all versions of Citrix VDI-in-a-Box version 
5.3.x up to and including 5.3.7 and 5.4.x up to and including version 5.4.3. 
Older versions may also be affected by this vulnerability.

This vulnerability has been assigned the following CVE number:

* CVE-2014-3780: Authentication bypass vulnerability in Citrix VDI-in-a-Box
Java servlet

What Customers Should Do

This vulnerability has been addressed in Citrix VDI-in-a-Box versions 5.3.8 
and later and version 5.4.4 and later. Citrix recommends that customers 
upgrade their VDI-in-a-Box deployments to these versions. These upgrades can 
be obtained from the following location:

Citrix VDI in a Box:

Version 5.4.4: 
https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-54

Version 5.3.8: 
https://www.citrix.com/downloads/vdi-in-a-box/product-software/vdi-in-a-box-53

A MyCitrix login is required to access these files.

Further information on how to apply the upgrades can be found in the following
document:

CTX140490 VDI-in-a-Box Hotfix Upgrades

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential 
security issue. This article is also available from the Citrix Knowledge 
Center at http://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix 
Technical Support. Contact details for Citrix Technical Support are available
at http://www.citrix.com/site/ss/supportContacts.asp.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any
and all potential vulnerabilities seriously. For guidance on how to report 
security-related issues to Citrix, please see the following document: 
CTX081743 Reporting Security Issues to Citrix

Applicable Products

    VDI-in-a-Box 5.3 
    VDI-in-a-Box 5.4

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=sd4E
-----END PGP SIGNATURE-----