CVE-2010-2990Improper Restriction of Operations within the Bounds of a Memory Buffer in Citrix ICA Client FOR Linux

Severity
9.3CRITICALNVD
EPSS
5.5%
top 9.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 11
Latest updateMay 14

Description

Citrix Online Plug-in for Windows for XenApp & XenDesktop before 11.2, Citrix Online Plug-in for Mac for XenApp & XenDesktop before 11.0, Citrix ICA Client for Linux before 11.100, Citrix ICA Client for Solaris before 8.63, and Citrix Receiver for Windows Mobile before 11.5 allow remote attackers to execute arbitrary code via (1) a crafted HTML document, (2) a crafted .ICA file, or (3) a crafted type field in an ICA graphics packet, related to a "heap offset overflow" issue.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages12 packages

Patches

🔴Vulnerability Details

1
GHSA
GHSA-ff9h-44c8-h9qm: Citrix Online Plug-in for Windows for XenApp & XenDesktop before 112022-05-14

💥Exploits & PoCs

1
Exploit-DB
Adobe - U3D CLODProgressiveMeshDeclaration Array Overrun (Metasploit) (1)2010-09-20

📋Vendor Advisories

2
Citrix
CVE-2010-2990: Citrix Online Plug-in for Windows for XenApp & XenDesktop before 11.2, Citrix Online Plug-in for Mac for XenApp & XenDesktop before 11.0, Citrix ICA C2010-08-11
Citrix
Citrix Security Bulletin CTX125975