-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.6295
         CVE-2014-4700 - Vulnerability in Citrix XenDesktop could
          result in unauthorized access to another user's desktop
                              2 December 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           XenDesktop
Publisher:         Citrix
Operating System:  Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-4700  

Original Bulletin: 
   https://support.citrix.com/article/CTX139591/cve20144700-vulnerability-in-citrix-xendesktop-could-result-in-unauthorized-access-to-another-users-desktop

Comment: CVSS (Max):  None available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

CVE-2014-4700 - Vulnerability in Citrix XenDesktop could result in unauthorized access to another user's desktop

Reference: CTX139591
Category : High
Created  : 10 July 2014
Modified : 15 August 2019

Applicable Products

  o XenDesktop 5.6 Common Criteria

Description of Problem

A vulnerability has been identified in Citrix XenDesktop that could result in a
user gaining unauthorized interactive access to another user's desktop.

This vulnerability affects a specific, non-default configuration of Citrix
XenDesktop 7 (all versions up to and including 7.5), Citrix XenDesktop 5 (up to
and including Rollup 5.6.300 for Citrix XenDesktop 5.6 FP1) and Citrix
XenDesktop 4 (all versions).

This vulnerability only affects Citrix XenDesktop deployments that use pooled
random desktop groups and where the broker configuration setting
ShutdownDesktopsAfterUse is set to disabled. Configurations that only use
assigned desktop groups, including RemotePC access scenarios and user-dedicated
desktops, are not affected by this issue.

This vulnerability has been assigned the following CVE number:

    o CVE-2014-4700: Vulnerability in Citrix XenDesktop versions 7.x, 5.x and
    4.x could result in unauthorized access to another user's desktop.

Mitigating Factors

The configuration setting ShutdownDesktopsAfterUse is enabled by default in
configurations that use pooled desktops groups to reset the disk image and
clean the desktop. For more details, please see the following Citrix
Knowledgebase article:

https://support.citrix.com/article/CTX127842

What Customers Should Do

Updates to Citrix XenDesktop have been released to address this issue. Citrix
strongly recommends that affected customers apply these updates as soon as
possible.

The hotfixes for Citrix XenDesktop 7.1 and 7.5 can be downloaded from the
following locations:

CTX140362 - Hotfix XD710ICAWSWX86005 - For VDA Core Services 7.1/7.5 for
Windows Desktop OS (32-bit) - English

CTX140363 - Hotfix XD710ICAWSWX64005 - For VDA Core Services 7.1/7.5 for
Windows Desktop OS (64-bit) - English

A VDA Rollup for Citrix XenDesktop 5.6 FP1 can be downloaded from the following
location:

CTX138550 - Hotfix Rollup XD560VDAWX86400 (Version 5.6.400) - For Citrix
XenDesktop Virtual Desktop Agent Core Services x86 - English

CTX138551 - Hotfix Rollup XD560VDAWX64400 (Version 5.6.400) - For Citrix
XenDesktop Virtual Desktop Agent Core Services x64 - English

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=V/3l
-----END PGP SIGNATURE-----