Vulnerability Description
Heap-based buffer overflow in Citrix Program Neighborhood client 9.0 and earlier allows remote attackers to execute arbitrary code via a long name value in an Application Set response.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citrix | Ica Program Neighborhood Client | 9.1 |
References
- http://secunia.com/advisories/18068PatchVendor Advisory
- http://securityreason.com/securityalert/266
- http://securitytracker.com/id?1015373
- http://support.citrix.com/kb/entry.jspa?externalID=CTX108354PatchVendor Advisory
- http://www.idefense.com/application/poi/display?id=357&type=vulnerabilitiesVendor Advisory
- http://www.osvdb.org/21816
- http://www.securityfocus.com/bid/15907Patch
- http://www.vupen.com/english/advisories/2005/2944
- http://secunia.com/advisories/18068PatchVendor Advisory
- http://securityreason.com/securityalert/266
- http://securitytracker.com/id?1015373
- http://support.citrix.com/kb/entry.jspa?externalID=CTX108354PatchVendor Advisory
- http://www.idefense.com/application/poi/display?id=357&type=vulnerabilitiesVendor Advisory
- http://www.osvdb.org/21816
- http://www.securityfocus.com/bid/15907Patch
FAQ
What is CVE-2005-3652?
CVE-2005-3652 is a vulnerability with a CVSS score of 7.5 (HIGH). Heap-based buffer overflow in Citrix Program Neighborhood client 9.0 and earlier allows remote attackers to execute arbitrary code via a long name value in an Application Set response.
How severe is CVE-2005-3652?
CVE-2005-3652 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3652?
Check the references section above for vendor advisories and patch information. Affected products include: Citrix Ica Program Neighborhood Client.