First published: Thu Apr 13 2017(Updated: )
A heap overflow vulnerability in Citrix NetScaler Gateway versions 10.1 before 135.8/135.12, 10.5 before 65.11, 11.0 before 70.12, and 11.1 before 52.13 allows a remote authenticated attacker to run arbitrary commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Netscaler Gateway Firmware | =10.1 | |
Citrix Netscaler Gateway Firmware | =10.5 | |
Citrix Netscaler Gateway Firmware | =11.0 | |
Citrix Netscaler Gateway Firmware | =11.1 | |
Citrix Netscaler Gateway Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7219 is rated as a medium severity vulnerability due to the potential for remote exploitation leading to command execution.
To mitigate CVE-2017-7219, you should upgrade to Citrix NetScaler Gateway versions 10.1.135.8 or 10.5.65.11, 11.0.70.12, or 11.1.52.13 or later.
CVE-2017-7219 affects Citrix NetScaler Gateway versions 10.1 before 135.8, 10.5 before 65.11, 11.0 before 70.12, and 11.1 before 52.13.
Yes, CVE-2017-7219 can be exploited by a remote authenticated attacker.
CVE-2017-7219 is classified as a heap overflow vulnerability.