Read the Original Article at http://www.informationweek.com/news/showArticle.jhtml?articleID=197000767
Citrix has fixed a buffer overflow vulnerability in its widely used Presentation Server software that could allow remote attackers to execute malicious code.
In a Tuesday advisory, Citrix said the flaw affects the software's print provider component, which lets users print to local printers from published applications.
Citrix Presentation Server is an application virtualization solution that allows remote users to securely access virtualized client/server applications. All versions of Citrix MetaFrame XP and Presentation Server up to and including 4.0 are affected, the vendor said.
Attackers could exploit the vulnerability through a local API call or through an unauthenticated Remote Procedure Call (RPC) request. However, a miscreant would need to have access to the RPC interface to exploit the flaw, which companies with Presentation Server deployments don't typically make accessible from outside, according to the advisory.
In a blog post, the SANS Internet Storm Center recommended that Presentation Server users apply the patch because an exploit for the vulnerability has already appeared.
Fort Lauderdale, Fla.-based Citrix rated the severity of the flaw as "high," the vendor's most critical rating. Symantec Deepsight had a similar view, rating its severity as 10 on a 10-point scale. But Danish research firm Secunia wasn't as concerned, assigning a threat score of 3 on a 5-point scale, or "moderately critical," to the vulnerability.
In November, Citrix fixed a pair of remotely exploitable vulnerabilities in its Presentation Server platform that could allow miscreants to trigger buffer overflows and launch denial of service attacks.