First published: Thu Jul 21 2011(Updated: )
The NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 attempts to validate signed DLLs by checking the certificate subject, not the signature, which allows man-in-the-middle attackers to execute arbitrary code via HTTP header data referencing a DLL that was signed with a crafted certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Access Gateway | =8.1 | |
Citrix Access Gateway | =9.0 | |
Citrix Access Gateway | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2883 is classified as a moderate severity vulnerability.
To fix CVE-2011-2883, you should upgrade to the appropriate version of Citrix Access Gateway that addresses the vulnerability.
CVE-2011-2883 allows man-in-the-middle attackers to execute arbitrary code due to improper validation of signed DLLs.
CVE-2011-2883 affects Citrix Access Gateway versions 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4.
CVE-2011-2883 involves the NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx.