Lucene search

K
citrixCitrixCTX237244
HistoryNov 09, 2020 - 9:09 a.m.

Citrix Security Advisory for TCP/IP Reassembly Resource Exhaustion

2020-11-0909:09:01
support.citrix.com
81

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

<section>
<div><div>
<div>
<h2> Description of Problem</h2>
<div>
<div>
<div>
<p>Several vulnerabilities in TCP/IP reassembly commonly known as SegmentSmack and FragmentSmack have recently been disclosed. SegmentSmack is CVE-2018-5390 for Linux and CVE-2018-6922 for FreeBSD. FragmentSmack is CVE-2018-5391 for Linux and CVE-2018-6923 for FreeBSD. These vulnerabilities could potentially allow an attacker that has the ability to maintain a TCP or IP stream with a vulnerable component to send crafted packets that cause high CPU usage or CPU resource exhaustion leading to denial of service.</p>
<p>Vulnerable reassembly is provided by some Linux-based or FreeBSD-based operating systems. Customers managing Linux or FreeBSD platforms on which Citrix components are deployed are advised to apply any appropriate operating system updates.</p>
<p>The following sections provide guidance on the impact and mitigation steps for Linux-based and FreeBSD-based Citrix products. Citrix products that do not include or execute on these platforms are not impacted by this vulnerability.</p>
<p>Windows-based components of XenDesktop and XenApp are not impacted by this issue.</p>
</div>
</div>
</div>
</div>
<div>
</div>
<div>
<h2> What Citrix Is Doing</h2>
<div>
<div>
<div>
<p>Citrix is in the process of analyzing the potential impact of this issue on currently supported products. </p>
</div>
</div>
</div>
</div>
<div>
<h2> Product Details</h2>
<div>
<div>
<div>
<h2> ByteMobile ATM</h2>
<div>
<div>
<div>
<p>ByteMobile ATM is affected by CVE-2018-5390 & CVE-2018-5391 and has been addresed in version 8.2.4.1. </p>
<p>Please contact support to access the updated version. More information on the 8.2.4.1 release can be found at the following location <a href=“https://support.citrix.com/article/CTX228251”>https://support.citrix.com/article/CTX228251</a></p>
</div>
</div>
</div>
</div>
<div>
<h2> Citrix NetScaler</h2>
<div>
<div>
<div>
<p>NetScaler MPX and NetScaler VPX are not impacted by CVE-2018-5390, CVE-2018-6922, CVE-2018-5391 and CVE-2018-6923</p>
<p>NetScaler SVM and NetScaler MAS are not impacted by CVE-2018-5390 & CVE-2018-5391</p>
</div>
</div>
</div>
</div>
<div>
<h2> Citrix XenServer</h2>
<div>
<div>
<div>
<p>Analysis of the impact of this issue on Citrix XenServer is in progress. This section will be updated as soon as additional information is available.</p>
</div>
</div>
</div>
</div>
<div>
<h2> Citrix XenMobile</h2>
<div>
<div>
<div>
<p>Analysis of the impact of this issue on Citrix XenMobile is in progress. This section will be updated as soon as additional information is available.</p>
</div>
</div>
</div>
</div>
<div>
<h2> Citrix Receiver for Linux</h2>
<div>
<div>
<div>
<p>Citrix recommends that customers apply any applicable patches to the underlying Linux operating system.</p>
</div>
</div>
</div>
</div>
<div>
<h2> Citrix Linux Virtual Desktop</h2>
<div>
<div>
<div>
<p>Citrix Linux Virtual Desktop deployments may be impacted by this operating system vulnerability. Citrix recommends that customers apply any applicable patches to the underlying Linux operating system.</p>
</div>
</div>
</div>
</div>
<div>
<h2> Citrix Licensing</h2>
<div>
<div>
<div>
<p>Analysis of the impact of this issue on Citrix Licensing is in progress. This section will be updated as soon as additional information is available.</p>
</div>
</div>
</div>
</div>
<div>
<h2> Citrix XenDesktop Volume Worker Template</h2>
<div>
<div>
<div>
<p>Amazon Web Services based deployments use the Linux AMI template. Guidance from Amazon about this issue can be found at the following location: <a></a><a href=“https://aws.amazon.com/security/security-bulletins/AWS-2018-018/”>https://aws.amazon.com/security/security-bulletins/AWS-2018-018/</a></p>
</div>
</div>
</div>
</div>
<div>
<p>The above list will be updated as the analysis into this issue progresses.</p>
</div>
</div>
</div>
</div>
<div>
<h2> Obtaining Support on This Issue</h2>
<div>
<div>
<div>
<div>
<div>
<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=“https://www.citrix.com/support/open-a-support-case.html”>https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<h2> Reporting Security Vulnerabilities</h2>
<div>
<div>
<div>
<div>
<div>
<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – <a href=“http://support.citrix.com/article/CTX081743”>Reporting Security Issues to Citrix</a></p>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<h2> Changelog</h2>
<div>
<div>
<div>
<table width=“100%”>
<tbody>
<tr>
<td colspan=“1” rowspan=“1”>Date </td>
<td colspan=“1” rowspan=“1”>Change</td>
</tr>
<tr>
<td colspan=“1” rowspan=“1”>August 8th 2018</td>
<td colspan=“1” rowspan=“1”>Initial bulletin published</td>
</tr>
<tr>
<td colspan=“1” rowspan=“1”>August 16th 2018</td>
<td colspan=“1” rowspan=“1”>Added CVE-2018-5391 and CVE-2018-6923 details</td>
</tr>
<tr>
<td colspan=“1” rowspan=“1”>November 13th 2018</td>
<td colspan=“1” rowspan=“1”>Added ByteMobile ATM </td>
</tr>
</tbody>
</table>
</div>
<div>
</div>
</div>
</div>
</div>
</div></div>
</section>

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C