var-201405-0302
Vulnerability from variot
Unspecified vulnerability in the Diffie-Hellman key agreement implementation in the management GUI Java applet in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 9.3-66.5 and 10.x before 10.1-122.17 has unknown impact and vectors. Citrix NetScaler is prone to an unspecified security vulnerability. Little is known about this issue or its effects at this time. We will update this BID as more information emerges. There are currently no details about this vulnerability. Please keep an eye on the cnnvd website or manufacturer announcements. Vulnerability title: Poor Quality Implementation of Diffie-Hellman Key Exchange in Citrix Netscaler CVE: CVE-2014-2881 Vendor: Citrix Product: Netscaler Affected version: All prior to 10.1-122.17/9.3-66.5 Fixed version: 10.1-122.17/9.3-66.5 Reported by: Graham Sutherland
Details:
The remote configuration Java applet contains a poor implementation of the Diffie-Hellman key exchange algorithm. The random number generator used to produce secret values is the java.util.Random class, which is not of cryptographic quality. Publicly known predictors exist for the underlying RNG, and the seed is either 32-bit or 48-bit depending on the host system.
Furthermore, the selection of the secret 'a' value within the key generation process is potentially vulnerable to timing attacks that leak the RNG state, as the implementation loops until the RNG outputs a value within a publicly known range.
Further details at: https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2881/
Copyright: Copyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
Disclaimer: The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201405-0302", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler access gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "9.3" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": null }, { "model": "netscaler access gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": null }, { "model": "netscaler application delivery controller", "scope": "lte", "trust": 1.0, "vendor": "citrix", "version": "9.3.e" }, { "model": "netscaler access gateway", "scope": "lte", "trust": 1.0, "vendor": "citrix", "version": "10.1.e" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.1-122.17" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.1-122.17" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "of 10.x" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "of 10.x" }, { "model": "netscaler access gateway", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "10.1.e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "9.3.e" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.1.100.3" }, { "model": "netscaler build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.196.4" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.1" }, { "model": "netscaler build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.070.5" }, { "model": "netscaler", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.0" } ], "sources": [ { "db": "BID", "id": "67156" }, { "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "db": "NVD", "id": "CVE-2014-2881" }, { "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:citrix:netscaler_access_gateway_firmware:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:citrix:netscaler_application_delivery_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.3.e", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:citrix:netscaler_access_gateway_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.1.e", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:citrix:netscaler_access_gateway:-:-:enterprise:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2881" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "67156" } ], "trust": 0.3 }, "cve": "CVE-2014-2881", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-2881", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-70820", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-2881", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201405-002", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-70820", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-70820" }, { "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "db": "NVD", "id": "CVE-2014-2881" }, { "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the Diffie-Hellman key agreement implementation in the management GUI Java applet in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 9.3-66.5 and 10.x before 10.1-122.17 has unknown impact and vectors. Citrix NetScaler is prone to an unspecified security vulnerability. \nLittle is known about this issue or its effects at this time. We will update this BID as more information emerges. There are currently no details about this vulnerability. Please keep an eye on the cnnvd website or manufacturer announcements. Vulnerability title: Poor Quality Implementation of Diffie-Hellman Key\nExchange in Citrix Netscaler\nCVE: CVE-2014-2881\nVendor: Citrix\nProduct: Netscaler\nAffected version: All prior to 10.1-122.17/9.3-66.5\nFixed version: 10.1-122.17/9.3-66.5\nReported by: Graham Sutherland\n\nDetails:\n\nThe remote configuration Java applet contains a poor implementation of\nthe Diffie-Hellman key exchange algorithm. The random number generator\nused to produce secret values is the java.util.Random class, which is\nnot of cryptographic quality. Publicly known predictors exist for the\nunderlying RNG, and the seed is either 32-bit or 48-bit depending on the\nhost system. \n\nFurthermore, the selection of the secret \u0027a\u0027 value within the key\ngeneration process is potentially vulnerable to timing attacks that leak\nthe RNG state, as the implementation loops until the RNG outputs a value\nwithin a publicly known range. \n \n\nFurther details at:\nhttps://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2881/\n\n\nCopyright:\nCopyright (c) Portcullis Computer Security Limited 2014, All rights\nreserved worldwide. Permission is hereby granted for the electronic\nredistribution of this information. It is not to be edited or altered in\nany way without the express written consent of Portcullis Computer\nSecurity Limited. \n\nDisclaimer:\nThe information herein contained may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There\nare NO warranties, implied or otherwise, with regard to this information\nor its use. Any use of this information is at the user\u0027s risk. In no\nevent shall the author/distributor (Portcullis Computer Security\nLimited) be held liable for any damages whatsoever arising out of or in\nconnection with the use or spread of this information", "sources": [ { "db": "NVD", "id": "CVE-2014-2881" }, { "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "db": "BID", "id": "67156" }, { "db": "VULHUB", "id": "VHN-70820" }, { "db": "PACKETSTORM", "id": "126518" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2881", "trust": 2.9 }, { "db": "SECTRACK", "id": "1030180", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2014-002345", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201405-002", "trust": 0.7 }, { "db": "BID", "id": "67156", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "126518", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-70820", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70820" }, { "db": "BID", "id": "67156" }, { "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "db": "PACKETSTORM", "id": "126518" }, { "db": "NVD", "id": "CVE-2014-2881" }, { "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "id": "VAR-201405-0302", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-70820" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:03:36.386000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX140651", "trust": 0.8, "url": "http://support.citrix.com/article/ctx140651" }, { "title": "agee-9.3-66.5", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=49707" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2881" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://support.citrix.com/article/ctx140651" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1030180" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2881" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2881" }, { "trust": 0.3, "url": "http://www.citrix.com/english/ps2/products/product.asp?contentid=21679" }, { "trust": 0.1, "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2881/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2881" } ], "sources": [ { "db": "VULHUB", "id": "VHN-70820" }, { "db": "BID", "id": "67156" }, { "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "db": "PACKETSTORM", "id": "126518" }, { "db": "NVD", "id": "CVE-2014-2881" }, { "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-70820" }, { "db": "BID", "id": "67156" }, { "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "db": "PACKETSTORM", "id": "126518" }, { "db": "NVD", "id": "CVE-2014-2881" }, { "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-05-01T00:00:00", "db": "VULHUB", "id": "VHN-70820" }, { "date": "2014-04-30T00:00:00", "db": "BID", "id": "67156" }, { "date": "2014-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "date": "2014-05-06T20:38:29", "db": "PACKETSTORM", "id": "126518" }, { "date": "2014-05-01T17:28:36.367000", "db": "NVD", "id": "CVE-2014-2881" }, { "date": "2014-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-18T00:00:00", "db": "VULHUB", "id": "VHN-70820" }, { "date": "2014-04-30T00:00:00", "db": "BID", "id": "67156" }, { "date": "2014-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002345" }, { "date": "2014-07-18T18:14:15.360000", "db": "NVD", "id": "CVE-2014-2881" }, { "date": "2014-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "126518" }, { "db": "CNNVD", "id": "CNNVD-201405-002" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix NetScaler Application Delivery Controller and NetScaler Gateway Management GUI of Java Applet vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002345" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201405-002" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.