A vulnerability has been identified in the XML Service interface of XenApp that could potentially be used by a remote, unauthenticated attacker to execute arbitrary code in the context of a service account on a XenApp server. The vulnerability could potentially be exploited by sending a specially crafted packet to the vulnerable component.
This vulnerability affects Citrix XenApp versions 6.5 both with, and without, Feature Pack 1.
This vulnerability has been assigned the following CVE:
In order to exploit this issue, the attacker would need to be able to access the XML Service interface. In a normal deployment, the XML Service would not be directly exposed to the Internet.
What Customers Should Do
Hotfixes have been released to address this issue. Citrix strongly recommends that all customers install these hotfixes, which can be downloaded from the following locations:
Citrix XenApp 6.5 for Windows Server 2008 R2 with Feature Pack 1: CTX135025 – Hotfix XA650R01W2K8R2X64033 – For Citrix XenApp 6.5 for Windows Server 2008 R2 – English
Customers that are not able to upgrade to XenApp 6.5 with Feature Pack 1 may use the hotfix for the release version of XenApp 6.5 which is available at the following location: Citrix XenApp 6.5 for Windows Server 2008 R2: CTX135499 – Hotfix XA650W2K8R2X64036 – For Citrix XenApp 6.5 for Windows Server 2008 R2 – English
Read more about this vulnerability here.