ID

VAR-200707-0194


CVE

CVE-2007-4018


TITLE

Citrix Access Gateway Advanced Edition Vulnerable to phishing attacks

Trust: 0.8

sources: JVNDB: JVNDB-2007-002415

DESCRIPTION

Citrix Access Gateway Advanced Edition before firmware 4.5.5 allows attackers to redirect users to arbitrary web sites and conduct phishing attacks via unknown vectors. Citrix Access Gateway Standard and Advanced Edition are prone to multiple remote vulnerabilities. Exploiting these issues could allow an attacker to: - Obtain sensitive information - Execute code remotely - Hijack sessions - Redirect users to arbitrary sites - Make unauthorized configuration changes Citrix has released patches for these vulnerabilities. Citrix Access Gateway, a general-purpose SSL VPN device, provides secure and always-on single-point access support for information resources. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. 1) A security issue due to residual information left on the client device can be exploited to gain unauthorized access to a user\x92s active session. 2) Multiple unspecified errors in client components (Net6Helper.DLL and npCtxCAO.dll as ActiveX control and Firefox plugin) of Access Gateway Standard and Advanced Editions can be exploited to execute arbitrary code in context of the logged-in user. 3) The web-based administration console of an Access Gateway appliance allows administrator to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to e.g. change certain configuration settings, by enticing a logged-in administrator to visit a malicious web site. This vulnerability is reported in Access Gateway model 2000 appliances with firmware version 4.5.2 and prior. A redirection issue that may facilitate phishing attacks has also been reported. SOLUTION: Apply hotfix and update firmware to version 4.5.5. Access Gateway Standard Edition 4.5: http://support.citrix.com/article/CTX114028 Access Gateway Advanced Edition 4.5: http://support.citrix.com/article/CTX112803 The vendor also recommends to remove the following components from client devices: VPN ActiveX components: * Net6Helper.DLL (Friendly name: Net6Launcher Class, version number up to and including 4.5.2) EPA Components (ActiveX): * npCtxCAO.dll (Friendly name: CCAOControl Object, version number up to 4,5,0,0) EPA Components (Firefox plugin): * npCtxCAO.dll (Friendly name: Citrix Endpoint Analysis Client, present in two locations) PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Martin O\x92Neal, Corsaire. 2) The vendor credits Michael White, Symantec. 3) The vendor credits Paul Johnston. ORIGINAL ADVISORY: http://support.citrix.com/article/CTX113814 http://support.citrix.com/article/CTX113815 http://support.citrix.com/article/CTX113816 http://support.citrix.com/article/CTX113817 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4018 // JVNDB: JVNDB-2007-002415 // BID: 24975 // VULHUB: VHN-27380 // PACKETSTORM: 57912

AFFECTED PRODUCTS

vendor:citrixmodel:access gatewayscope:lteversion:4.5

Trust: 1.0

vendor:citrixmodel:access gatewayscope:ltversion:advanced edition

Trust: 0.8

vendor:citrixmodel:access gatewayscope:eqversion:firmware 4.5.5

Trust: 0.8

vendor:citrixmodel:access gatewayscope:eqversion:4.5

Trust: 0.6

vendor:citrixmodel:advanced access controlscope:eqversion:4.2

Trust: 0.3

vendor:citrixmodel:advanced access controlscope:eqversion:4.0

Trust: 0.3

vendor:citrixmodel:access gateway standard editionscope:eqversion:4.5

Trust: 0.3

vendor:citrixmodel:access gateway advanced editionscope:eqversion:4.5

Trust: 0.3

vendor:citrixmodel:advanced access control hf.1scope:neversion: -

Trust: 0.3

vendor:citrixmodel:access gateway standard editionscope:neversion:4.5.5

Trust: 0.3

vendor:citrixmodel:access gateway advanced editionscope:neversion:4.5.5

Trust: 0.3

sources: BID: 24975 // JVNDB: JVNDB-2007-002415 // CNNVD: CNNVD-200707-431 // NVD: CVE-2007-4018

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4018
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-4018
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200707-431
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27380
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-4018
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27380
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27380 // JVNDB: JVNDB-2007-002415 // CNNVD: CNNVD-200707-431 // NVD: CVE-2007-4018

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-4018

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200707-431

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200707-431

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002415

PATCH

title:CTX113816url:http://support.citrix.com/article/CTX113816

Trust: 0.8

title:CTX114028url:http://support.citrix.com/article/CTX114028

Trust: 0.8

sources: JVNDB: JVNDB-2007-002415

EXTERNAL IDS

db:NVDid:CVE-2007-4018

Trust: 2.8

db:BIDid:24975

Trust: 2.0

db:SECUNIAid:26143

Trust: 1.8

db:OSVDBid:37840

Trust: 1.7

db:VUPENid:ADV-2007-2583

Trust: 1.7

db:SECTRACKid:1018435

Trust: 1.7

db:JVNDBid:JVNDB-2007-002415

Trust: 0.8

db:CNNVDid:CNNVD-200707-431

Trust: 0.7

db:XFid:35512

Trust: 0.6

db:VULHUBid:VHN-27380

Trust: 0.1

db:PACKETSTORMid:57912

Trust: 0.1

sources: VULHUB: VHN-27380 // BID: 24975 // JVNDB: JVNDB-2007-002415 // PACKETSTORM: 57912 // CNNVD: CNNVD-200707-431 // NVD: CVE-2007-4018

REFERENCES

url:http://support.citrix.com/article/ctx113816

Trust: 2.1

url:http://support.citrix.com/article/ctx114028

Trust: 1.8

url:http://www.securityfocus.com/bid/24975

Trust: 1.7

url:http://osvdb.org/37840

Trust: 1.7

url:http://www.securitytracker.com/id?1018435

Trust: 1.7

url:http://secunia.com/advisories/26143

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2583

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35512

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4018

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4018

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/2583

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35512

Trust: 0.6

url:http://support.citrix.com/article/ctx113814

Trust: 0.4

url:http://support.citrix.com/article/ctx113815

Trust: 0.4

url:http://support.citrix.com/article/ctx113817

Trust: 0.4

url:/archive/1/482626

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6168/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/26143/

Trust: 0.1

url:http://support.citrix.com/article/ctx112803

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27380 // BID: 24975 // JVNDB: JVNDB-2007-002415 // PACKETSTORM: 57912 // CNNVD: CNNVD-200707-431 // NVD: CVE-2007-4018

CREDITS

Martin O'Neal Paul Johnston

Trust: 0.6

sources: CNNVD: CNNVD-200707-431

SOURCES

db:VULHUBid:VHN-27380
db:BIDid:24975
db:JVNDBid:JVNDB-2007-002415
db:PACKETSTORMid:57912
db:CNNVDid:CNNVD-200707-431
db:NVDid:CVE-2007-4018

LAST UPDATE DATE

2025-04-10T23:13:15.728000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27380date:2017-07-29T00:00:00
db:BIDid:24975date:2016-07-05T22:00:00
db:JVNDBid:JVNDB-2007-002415date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200707-431date:2007-07-27T00:00:00
db:NVDid:CVE-2007-4018date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27380date:2007-07-26T00:00:00
db:BIDid:24975date:2007-07-19T00:00:00
db:JVNDBid:JVNDB-2007-002415date:2012-06-26T00:00:00
db:PACKETSTORMid:57912date:2007-07-21T02:11:22
db:CNNVDid:CNNVD-200707-431date:2007-07-25T00:00:00
db:NVDid:CVE-2007-4018date:2007-07-26T01:30:00