The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/1077 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000%40naughty.monkey.org |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2000-03-29 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2000-0244
Mitre link : CVE-2000-0244
CVE.ORG link : CVE-2000-0244
JSON object : View
Products Affected
citrix
- winframe
- metaframe
CWE