First published: Wed Aug 11 2010(Updated: )
Citrix Online Plug-in for Windows for XenApp & XenDesktop before 11.2, Citrix Online Plug-in for Mac for XenApp & XenDesktop before 11.0, Citrix ICA Client for Linux before 11.100, Citrix ICA Client for Solaris before 8.63, and Citrix Receiver for Windows Mobile before 11.5 allow remote attackers to execute arbitrary code via (1) a crafted HTML document, (2) a crafted .ICA file, or (3) a crafted type field in an ICA graphics packet, related to a "heap offset overflow" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix ICA Client for Linux | <=11.0 | |
Citrix ICA Client for Solaris | <=8.62 | |
Citrix Online Plug-in For Mac For Xenapp & Xendesktop | <=10.0 | |
Citrix Online Plug-in For Windows For Xenapp & Xendesktop | <=11.1 | |
Citrix Receiver | <=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2990 is classified as a high-severity vulnerability due to its potential for remote exploitation.
CVE-2010-2990 affects multiple Citrix products including versions of the Online Plug-in, ICA Client, and Receiver prior to specified versions.
To remediate CVE-2010-2990, you should upgrade to the latest versions of the affected Citrix software listed in the vulnerability documentation.
Yes, CVE-2010-2990 allows remote attackers to exploit systems without physical access.
Exploitation of CVE-2010-2990 may lead to unauthorized access and control over affected systems.