Heap-based buffer overflow in Citrix Program Neighborhood client 9.0 and earlier allows remote attackers to execute arbitrary code via a long name value in an Application Set response.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18068 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/266 - | |
References | () http://securitytracker.com/id?1015373 - | |
References | () http://support.citrix.com/kb/entry.jspa?externalID=CTX108354 - Patch, Vendor Advisory | |
References | () http://www.idefense.com/application/poi/display?id=357&type=vulnerabilities - Vendor Advisory | |
References | () http://www.osvdb.org/21816 - | |
References | () http://www.securityfocus.com/bid/15907 - Patch | |
References | () http://www.vupen.com/english/advisories/2005/2944 - |
Information
Published : 2005-12-16 23:03
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3652
Mitre link : CVE-2005-3652
CVE.ORG link : CVE-2005-3652
JSON object : View
Products Affected
citrix
- ica_program_neighborhood_client
CWE