Plugin ID | 144 |
Plugin name | Citrix Server detection |
Plugin filename | Citrix Server detection.plugin |
Plugin filesize | 3086 bytes |
Plugin family | Enumeration |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/06 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Corrected a spelling mistake in version 1.1 in the solution (a space was missing). Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 1494 |
Plugin procedure detection | open|sleep|close|pattern_exists ICA |
Plugin detection accuracy | 99 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug affected | Citrix Application Server |
Bug not affected | Other products |
Bug vulnerability class | Configuration |
Bug description | Citrix is an add-on for Windows users to remotely connect to a host.This application may be used to gather information about the target or the user. There are also some vulnerabilities available. By default the Citrix Server application utilizes a weak 40 bit obfuscation algorithm (not even a true encryption). If the default settings have not been changed, there already exists tools which can be used to passively ferret userIDs and passwords as they traverse a network. |
Bug solution | Disable the service if it is not needed. Also, make sure that the server is configured to utilize strong encryption and install firewalling to prevent unwanted connections. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/7276/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 8 |
Bug simplicity | 8 |
Bug impact | 6 |
Bug risk | 7 |
Bug Nessus risk | Low |
Bug check tools | Nessus is also able to do the same check. |
Source SecurityFocus BID | 7276 |
Source Nessus ID | 10942 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |