ID

VAR-200707-0453


CVE

CVE-2007-3679


TITLE

Citrix EPA ActiveX Vulnerability in Control Downloading Arbitrary Programs on Client System

Trust: 0.8

sources: JVNDB: JVNDB-2007-002313

DESCRIPTION

The Citrix EPA ActiveX control (aka the "endpoint checking control" or CCAOControl Object) before 4.5.0.0 in npCtxCAO.dll in Citrix Access Gateway Standard Edition before 4.5.5 and Advanced Edition before 4.5 HF1 allows remote attackers to download and execute arbitrary programs onto a client system. Citrix EPA ActiveX control is prone to a remote code-execution vulnerability. An attacker may exploit this issue by enticing victims into visiting a malicious webpage. Successful exploits may allow attackers to execute arbitrary code on a victim's computer. This may facilitate a compromise of vulnerable computers. Citrix Access Gateway, a general-purpose SSL VPN device, provides secure and always-on single-point access support for information resources. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec Vulnerability Research http://www.symantec.com/research Security Advisory Advisory ID: SYMSA-2007-006 Advisory Title: Citrix EPA ActiveX Control Design Flaw Author: Michael White / michael_white@symantec.com Release Date: 19-07-2007 Application: Citrix Access Gateway Platform: Internet Explorer/Win32 Severity: Remote arbitrary code execution Vendor status: Patch available CVE Number: CVE-2007-3679 Reference: http://www.securityfocus.com/bid/24865 Overview: Citrix Access Gateway offers a clientless SSL VPN solution implemented through a series of browser-based controls. As part of the endpoint validation, the ActiveX control for Internet Explorer downloads and executes a series of executable modules from the remote server. Details: Researchers identified that the endpoint checking control can be embedded in any web page and subverted to download and execute any executable module of the attacker\x92s choosing. This vulnerability represents a design flaw in the architecture of the endpoint validation practice. A high level of browser trust is required to allow the endpoint checks to function correctly, and the control is signed by Citrix Corporation. Vendor Response: This has been addressed by a product update. See http://support.citrix.com/article/CTX113815 Recommendation: Apply the product update as detailed in http://support.citrix.com/article/CTX113815 Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2007-3679 - -------Symantec Vulnerability Research Advisory Information------- For questions about this advisory, or to report an error: research@symantec.com For details on Symantec's Vulnerability Reporting Policy: http://www.symantec.com/research/Symantec-Responsible-Disclosure.pdf Symantec Vulnerability Research Advisory Archive: http://www.symantec.com/research/ Symantec Vulnerability Research GPG Key: http://www.symantec.com/research/Symantec_Vulnerability_Research_GPG.asc - -------------Symantec Product Advisory Information------------- To Report a Security Vulnerability in a Symantec Product: secure@symantec.com For general information on Symantec's Product Vulnerability reporting and response: http://www.symantec.com/security/ Symantec Product Advisory Archive: http://www.symantec.com/avcenter/security/SymantecAdvisories.html Symantec Product Advisory PGP Key: http://www.symantec.com/security/Symantec-Vulnerability-Management-Key.asc - --------------------------------------------------------------- Copyright (c) 2007 by Symantec Corp. Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Consulting Services. Reprinting the whole or part of this alert in any medium other than electronically requires permission from research@symantec.com. Disclaimer The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. Symantec, Symantec products, and Symantec Consulting Services are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (MingW32) iD8DBQFGnRXXuk7IIFI45IARAla8AKDKwcYD23htC+trwq1Ke5Qvam99YACfUgJh VynDvAnppLmojz2wbrLfR+U= =QakL -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Citrix Access Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26143 VERIFY ADVISORY: http://secunia.com/advisories/26143/ CRITICAL: Highly critical IMPACT: Cross Site Scripting, Exposure of sensitive information, System access WHERE: >From remote SOFTWARE: Citrix Access Gateway 4.x http://secunia.com/product/6168/ DESCRIPTION: Some vulnerabilities and a security issue have been reported in Citrix Access Gateway, which can be exploited by malicious people to disclose sensitive information, conduct cross-site request forgery attacks, or to compromise a user's system. 1) A security issue due to residual information left on the client device can be exploited to gain unauthorized access to a user\x92s active session. This security issue is reported in Access Gateway Advanced Edition 4.5 and prior. These vulnerabilities are reported in Access Gateway Standard Edition 4.5.2 and prior and Access Gateway Advanced Editions version 4.5 and prior with appliance firmware 4.5.2 and prior. 3) The web-based administration console of an Access Gateway appliance allows administrator to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to e.g. change certain configuration settings, by enticing a logged-in administrator to visit a malicious web site. This vulnerability is reported in Access Gateway model 2000 appliances with firmware version 4.5.2 and prior. Access Gateway Enterprise Edition is reportedly not affected. A redirection issue that may facilitate phishing attacks has also been reported. SOLUTION: Apply hotfix and update firmware to version 4.5.5. 2) The vendor credits Michael White, Symantec. 3) The vendor credits Paul Johnston. ORIGINAL ADVISORY: http://support.citrix.com/article/CTX113814 http://support.citrix.com/article/CTX113815 http://support.citrix.com/article/CTX113816 http://support.citrix.com/article/CTX113817 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2007-3679 // JVNDB: JVNDB-2007-002313 // BID: 24865 // VULHUB: VHN-27041 // PACKETSTORM: 57916 // PACKETSTORM: 57912

AFFECTED PRODUCTS

vendor:citrixmodel:access gatewayscope:eqversion:4.5.5

Trust: 1.4

vendor:citrixmodel:access gatewayscope:lteversion:4.5

Trust: 1.0

vendor:citrixmodel:access gatewayscope:lteversion:4.5.5

Trust: 1.0

vendor:citrixmodel:access gatewayscope:eqversion:4.5 hf1

Trust: 0.8

vendor:citrixmodel:access gatewayscope:ltversion:advanced edition

Trust: 0.8

vendor:citrixmodel:access gatewayscope:ltversion:st ard edition

Trust: 0.8

vendor:citrixmodel:access gatewayscope:eqversion:4.5

Trust: 0.6

vendor:citrixmodel:access gateway standard editionscope:eqversion:4.5

Trust: 0.3

vendor:citrixmodel:access gateway advanced editionscope:eqversion:4.5

Trust: 0.3

vendor:citrixmodel:access gateway aacscope:eqversion:4.0

Trust: 0.3

vendor:citrixmodel:access gateway aacscope:eqversion:4.2

Trust: 0.3

vendor:citrixmodel:access gatewayscope:eqversion:0

Trust: 0.3

sources: BID: 24865 // JVNDB: JVNDB-2007-002313 // CNNVD: CNNVD-200707-451 // NVD: CVE-2007-3679

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3679
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-3679
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200707-451
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27041
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-3679
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27041
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27041 // JVNDB: JVNDB-2007-002313 // CNNVD: CNNVD-200707-451 // NVD: CVE-2007-3679

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3679

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200707-451

TYPE

Design Error

Trust: 0.9

sources: BID: 24865 // CNNVD: CNNVD-200707-451

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002313

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27041

PATCH

title:CTX113815url:http://support.citrix.com/article/CTX113815

Trust: 0.8

title:CTX114028url:http://support.citrix.com/article/CTX114028

Trust: 0.8

sources: JVNDB: JVNDB-2007-002313

EXTERNAL IDS

db:NVDid:CVE-2007-3679

Trust: 2.9

db:BIDid:24865

Trust: 2.1

db:SECUNIAid:26143

Trust: 1.8

db:BIDid:24975

Trust: 1.7

db:VUPENid:ADV-2007-2583

Trust: 1.7

db:OSVDBid:37845

Trust: 1.7

db:SREASONid:2916

Trust: 1.7

db:JVNDBid:JVNDB-2007-002313

Trust: 0.8

db:CNNVDid:CNNVD-200707-451

Trust: 0.7

db:BUGTRAQid:20070718 SYMSA-2007-006: CITRIX EPA ACTIVEX CONTROL DESIGN FLAW

Trust: 0.6

db:XFid:35511

Trust: 0.6

db:PACKETSTORMid:57916

Trust: 0.2

db:VULHUBid:VHN-27041

Trust: 0.1

db:PACKETSTORMid:57912

Trust: 0.1

sources: VULHUB: VHN-27041 // BID: 24865 // JVNDB: JVNDB-2007-002313 // PACKETSTORM: 57916 // PACKETSTORM: 57912 // CNNVD: CNNVD-200707-451 // NVD: CVE-2007-3679

REFERENCES

url:http://support.citrix.com/article/ctx113815

Trust: 2.2

url:http://www.securityfocus.com/bid/24865

Trust: 1.8

url:http://support.citrix.com/article/ctx114028

Trust: 1.8

url:http://www.securityfocus.com/bid/24975

Trust: 1.7

url:http://www.symantec.com/content/en/us/enterprise/research/symsa-2007-006.txt

Trust: 1.7

url:http://osvdb.org/37845

Trust: 1.7

url:http://secunia.com/advisories/26143

Trust: 1.7

url:http://securityreason.com/securityalert/2916

Trust: 1.7

url:http://www.securityfocus.com/archive/1/474204/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2583

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35511

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3679

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3679

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/2583

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/474204/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35511

Trust: 0.6

url:http://www.citrix.com/

Trust: 0.3

url:/archive/1/474204

Trust: 0.3

url:http://www.symantec.com/research/symantec-responsible-disclosure.pdf

Trust: 0.1

url:http://www.symantec.com/research

Trust: 0.1

url:http://www.symantec.com/research/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3679

Trust: 0.1

url:http://www.symantec.com/avcenter/security/symantecadvisories.html

Trust: 0.1

url:http://www.symantec.com/security/

Trust: 0.1

url:http://www.symantec.com/security/symantec-vulnerability-management-key.asc

Trust: 0.1

url:http://cve.mitre.org),

Trust: 0.1

url:http://www.symantec.com/research/symantec_vulnerability_research_gpg.asc

Trust: 0.1

url:http://support.citrix.com/article/ctx113817

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6168/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/26143/

Trust: 0.1

url:http://support.citrix.com/article/ctx112803

Trust: 0.1

url:http://support.citrix.com/article/ctx113814

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://support.citrix.com/article/ctx113816

Trust: 0.1

sources: VULHUB: VHN-27041 // BID: 24865 // JVNDB: JVNDB-2007-002313 // PACKETSTORM: 57916 // PACKETSTORM: 57912 // CNNVD: CNNVD-200707-451 // NVD: CVE-2007-3679

CREDITS

Michael White※ michael_white@symantec.com

Trust: 0.6

sources: CNNVD: CNNVD-200707-451

SOURCES

db:VULHUBid:VHN-27041
db:BIDid:24865
db:JVNDBid:JVNDB-2007-002313
db:PACKETSTORMid:57916
db:PACKETSTORMid:57912
db:CNNVDid:CNNVD-200707-451
db:NVDid:CVE-2007-3679

LAST UPDATE DATE

2025-04-10T23:13:15.655000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27041date:2018-10-15T00:00:00
db:BIDid:24865date:2007-07-23T23:36:00
db:JVNDBid:JVNDB-2007-002313date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200707-451date:2007-07-25T00:00:00
db:NVDid:CVE-2007-3679date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27041date:2007-07-25T00:00:00
db:BIDid:24865date:2007-07-19T00:00:00
db:JVNDBid:JVNDB-2007-002313date:2012-06-26T00:00:00
db:PACKETSTORMid:57916date:2007-07-21T02:16:01
db:PACKETSTORMid:57912date:2007-07-21T02:11:22
db:CNNVDid:CNNVD-200707-451date:2007-07-25T00:00:00
db:NVDid:CVE-2007-3679date:2007-07-25T17:30:00