The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/1077 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000%40naughty.monkey.org |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2000-04-12T04:00:00
Updated: 2004-04-20T09:00:00
Reserved: 2000-04-12T00:00:00
Link: CVE-2000-0244
JSON object: View
NVD Information
Status : Modified
Published: 2000-03-29T05:00:00.000
Modified: 2023-11-07T01:55:15.317
Link: CVE-2000-0244
JSON object: View
Redhat Information
No data.
CWE