ID CVE-2000-0244
Summary The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
References
Vulnerable Configurations
  • cpe:2.3:a:citrix:metaframe:1.0:*:unix:*:*:*:*:*
    cpe:2.3:a:citrix:metaframe:1.0:*:unix:*:*:*:*:*
  • cpe:2.3:a:citrix:metaframe:*:*:windows_2000:*:*:*:*:*
    cpe:2.3:a:citrix:metaframe:*:*:windows_2000:*:*:*:*:*
  • cpe:2.3:a:citrix:metaframe:*:*:windows_nt_4.0_tse:*:*:*:*:*
    cpe:2.3:a:citrix:metaframe:*:*:windows_nt_4.0_tse:*:*:*:*:*
  • cpe:2.3:a:citrix:winframe:3.5_1.8_for_windows_nt:*:*:*:*:*:*:*
    cpe:2.3:a:citrix:winframe:3.5_1.8_for_windows_nt:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 10-09-2008 - 19:03)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 1077
bugtraq 20000328 Citrix ICA Basic Encryption
Last major update 10-09-2008 - 19:03
Published 29-03-2000 - 05:00
Last modified 10-09-2008 - 19:03
Back to Top