First published: Wed Mar 29 2000(Updated: )
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix MetaFrame | =1.0 | |
Citrix MetaFrame | <=1.8 | |
Citrix Winframe | =3.5_1.8_for_windows_nt | |
Citrix MetaFrame | <=1.8 | |
<=1.8 | ||
<=1.8 | ||
=1.0 | ||
=3.5_1.8_for_windows_nt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.