Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.10942
Kategorie:Service detection
Titel:Check for a Citrix server
Zusammenfassung:A Citrix server is running on this machine.;; Citrix servers allow a Windows user to remotely; obtain a graphical login (and therefore act as a local; user on the remote host).;; NOTE: by default the Citrix Server application; utilizes a weak 40 bit obfuscation algorithm (not; even a true encryption). If the default settings have; not been changed, there already exists tools which can; be used to passively ferret userIDs and passwords as they; traverse a network.;; If this server is located within your DMZ, the risk is; substantially higher, as Citrix necessarily requires; access into the internal network for applications like; SMB browsing, file sharing, email synchronization, etc.;; If an attacker gains a valid login and password, he may; be able to use this service to gain further access on; the remote host or remote network. This protocol has also; been shown to be vulnerable to a man-in-the-middle attack.
Beschreibung:Summary:
A Citrix server is running on this machine.

Citrix servers allow a Windows user to remotely
obtain a graphical login (and therefore act as a local
user on the remote host).

NOTE: by default the Citrix Server application
utilizes a weak 40 bit obfuscation algorithm (not
even a true encryption). If the default settings have
not been changed, there already exists tools which can
be used to passively ferret userIDs and passwords as they
traverse a network.

If this server is located within your DMZ, the risk is
substantially higher, as Citrix necessarily requires
access into the internal network for applications like
SMB browsing, file sharing, email synchronization, etc.

If an attacker gains a valid login and password, he may
be able to use this service to gain further access on
the remote host or remote network. This protocol has also
been shown to be vulnerable to a man-in-the-middle attack.

Solution:
Disable this service if you do not use it. Also, make sure
that the server is configured to utilize strong encryption.

CVSS Score:
0.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:N

Querverweis: BugTraq ID: 7276
CopyrightThis script is Copyright (C) 2002 John Lampe...j_lampe@bellsouth.net

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.