The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/1077 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000@naughty.monkey.org |
Configurations
Configuration 1 (hide)
|
Information
Published : 2000-03-28 21:00
Updated : 2008-09-10 12:03
NVD link : CVE-2000-0244
Mitre link : CVE-2000-0244
JSON object : View
CWE
Products Affected
citrix
- winframe
- metaframe