![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10942 |
Category: | Service detection |
Title: | Citrix Server Detection |
Summary: | A Citrix server is running on this machine. |
Description: | Summary: A Citrix server is running on this machine. Vulnerability Insight: Citrix servers allow a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host). NOTE: by default the Citrix Server application utilizes a weak 40 bit obfuscation algorithm (not even a true encryption). If the default settings have not been changed, there already exists tools which can be used to passively ferret userIDs and passwords as they traverse a network. If this server is located within your DMZ, the risk is substantially higher, as Citrix necessarily requires access into the internal network for applications like SMB browsing, file sharing, email synchronization, etc. If an attacker gains a valid login and password, he may be able to use this service to gain further access on the remote host or remote network. This protocol has also been shown to be vulnerable to a man-in-the-middle attack. Solution: Disable this service if you do not use it. Also, make sure that the server is configured to utilize strong encryption. CVSS Score: 0.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:N |
Copyright | Copyright (C) 2005 John Lampe...j_lampe@bellsouth.net |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |