First published: Thu Jul 26 2012(Updated: )
Heap-based buffer overflow in the SoapServer service in Citrix Provisioning Services 5.0, 5.1, 5.6, 5.6 SP1, 6.0, and 6.1 allows remote attackers to execute arbitrary code via a crafted string associated with date and time data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Provisioning | =5.0 | |
Citrix Provisioning | =5.1 | |
Citrix Provisioning | =5.6 | |
Citrix Provisioning | =5.6-sp1 | |
Citrix Provisioning | =6.0 | |
Citrix Provisioning | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4068 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2012-4068, apply the appropriate patches or updates provided by Citrix for the affected versions of Provisioning Services.
CVE-2012-4068 affects Citrix Provisioning Services versions 5.0, 5.1, 5.6, 5.6 SP1, 6.0, and 6.1.
CVE-2012-4068 is a heap-based buffer overflow vulnerability.
Yes, CVE-2012-4068 can be exploited remotely through crafted input to the SoapServer service.