Description of Problem
The Citrix print provider is used by Citrix Presentation Server to allow users to print to their local printer from published applications. A buffer overflow vulnerability has been reported in this component, this can be exploited by either:
• A local API call
• An unauthenticated RPC request
This overflow could be used to execute arbitrary code in the context of the Local System account.
This vulnerability is present in all versions of Citrix MetaFrame XP and Presentation Server up to and including 4.0.
Access to the RPC interface would be needed to remotely exploit this issue. In typical deployments of Citrix Presentation Server this interface would not be externally accessible.
What Customers Should Do
A hotfix has been released to address both of these issues. Citrix recommends that affected customers install the hotfix which can be downloaded from the following locations:
MetaFrame XP 1.0 for Windows 2000 Server:
MetaFrame XP 1.0 for Windows Server 2003:
MetaFrame Presentation Server 3.0 for Windows 2000 Server:
MetaFrame Presentation Server 3.0 for Windows Server 2003:
Citrix Presentation Server 4.0 for Windows 2000 Server:
Citrix Presentation Server 4.0 for Windows Server 2003:
Citrix Presentation Server 4.0 for Windows Server 2003 x64 Editions:
What Citrix Is Doing
Citrix is proactively notifying customers and channel partners about this potential security issue. An article containing the information in this bulletin is available from the Citrix Knowledge Base at http://support.citrix.com/.
Obtaining Support on this Issue
If you require technical assistance with this issue, please contact Citrix Technical Support. Information for contacting Citrix Technical Support is available at http://support.citrix.com/.
Reporting Security Vulnerabilities to Citrix
Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities very seriously. If you would like to report a security issue to Citrix, please compose an e-mail to [email protected] containing the exact version of the product in which the vulnerability was found and steps to reproduce the vulnerability.