Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1688 Buffer Overflow Vulnerability in Citrix ADC and Citrix NetScaler Gateway 14 May 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Citrix ADC Citrix NetScaler Gateway Publisher: Citrix Operating System: Network Appliance Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-12044 Original Bulletin: https://support.citrix.com/article/CTX249976 - --------------------------BEGIN INCLUDED TEXT-------------------- Buffer Overflow Vulnerability in Citrix ADC and Citrix NetScaler Gateway Reference: CTX249976 Category : Medium Created : 13 May 2019 Modified : 13 May 2019 Applicable Products o Citrix ADC o NetScaler Gateway Description of Problem A buffer overflow vulnerability has been identified in Citrix ADC and Citrix NetScaler Gateway which could possibly result in a denial-of-service in a specific configuration. This vulnerability has been assigned the following CVE number: o CVE-2019-12044: Buffer overflow vulnerability in Citrix ADC and Citrix NetScaler Gateway This vulnerability is present in the following versions of Citrix ADC and Citrix NetScaler Gateway: 10.5.x earlier than version 10.5.70 11.1.x earlier than version 11.1.59.10 12.0.x earlier than version 12.0.59.8 12.1.x earlier than version 12.1.49.23 Mitigating Factors The vulnerability can be mitigated by ensuring that virtual servers stay in the up state, or by disabling URL redirection. Removal of the redirect URL from the load balancer configuration mitigates this issue. In situations where failover is still needed for a down load balancer, ensure that the redirect URL contains at least a domain name ending with a /. How to Configure Redirect URL on NetScaler Virtual Server When Virtual Server is Not Available- https://support.citrix.com/article/CTX108946 What Customers Should Do This vulnerability has been addressed in new versions of the Citrix ADC and Citrix NetScaler Gateway software. Citrix recommends that customers upgrade their Citrix ADC and Citrix NetScaler Gateway appliances to one of the following versions: 11.1.59.10 and later 12.0.59.8 and later 12.1.49.23 and later These upgrades can be obtained from the Citrix website at the following locations: Citrix ADC : https://www.citrix.com/downloads/citrix-adc/ Citrix NetScaler Gateway: https://www.citrix.com/downloads/citrix-gateway/product-software.html The 10.5.70.x version is expected to release in the near future, until released it is recommended to apply the configuration mitigation or upgrade to a fixed version. Changelog +-------------------------------+---------------------------------------------+ |Date |Change | +-------------------------------+---------------------------------------------+ |13th May 2019 |Initial publication | +-------------------------------+---------------------------------------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXNpIgWaOgq3Tt24GAQjr+Q/+KnZPmUr2z/ZOEIbcxgZexST3XHvb02KO apNMDjNIwqGFWHi2czQjfPBmeVMweaE+8HNmiWphmgokrQxFVh79fjE+g8aF4xkG Dos2pytLm6Hs5Upi1YJXFnUNdgsJDcaLSBibco0ZSBdXtUTxV8cc/8QWxKPpawHS dY+Ln46j9HArGnH2XvLjwLIiPVzlDo5/feSF0Vxyu9xDdM1Njghcw/wZn0hi69Pm WPUQewKVDg9VzeaDAuSfcHr7zytxm2Bq2771CRluNyprZEunScZoMao2swPAl6FS r4pKekvHmsmR8JQlTYioxzVfbxnqIzee3NggMC9F+lmREaGIw8inhDQ+7cSnzmw/ JlPN0/oWPWaFsH2j6kDmiLq6+y3DidXfd3PRUJmxcovaQVsyxgsP1tEDKru8vL9Y wE2aRoFy+Af5gVs4tG5CUFEtQFpuja3AZe1TVIyyaaIB358U58a4nYqtLcS+1UBz S9/X9qkdRP1uwYUePIZowXb30Ye5ojXsnCtP/PR/144QlmM0bS+d/D7Dbc1BZdER OAEPecxgyY6FxD0fU9p5ctmVExl/qxX9bOs3aJl6/9FS2HS/6jww7eib06NKojxs 1gJr+9JsKPEDFbhQlvHFid1QL/au9S2J2Om8Z9Iv5xOuPeFteWDiClbo3pjQyH1m zdk0rdsQgIs= =cWSf -----END PGP SIGNATURE-----