Citrix XenApp Online Plug-in / Receiver Crafted Certificate MitM Spoofing Weakness

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

A client application installed on the remote Windows host is affected
by a man-in-the-middle vulnerability.

Description :

The version of Citrix Online Plug-in or ICA Client installed on the
remote Windows host is affected by an unspecified man-in-the-middle
(MitM) vulnerability. This issue is related to Microsoft security
bulletin MS09-056 and is likely due to a failure to detect null bytes
in the common name of a server certificate. A remote attacker can
exploit this issue to perform a man-in-the-middle attack, allowing the
attacker to read or modify SSL/TLS traffic being sent to and from the
host.

This plugin only checks the ICA Client running on Windows, though
other platforms are affected.

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS09-056
http://support.citrix.com/article/CTX123248

Solution :

Upgrade to Citrix Online Plug-in or Citrix ICA Client version
11.0.150 / 11.2.0 or later.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 42961 (citrix_ica_client_ssl_mitm.nasl)

Bugtraq ID: 37073

CVE ID: CVE-2009-3936

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now