Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-1062

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2005-1062
Last Modified 07 Mar 2011 09:21:01
Published 02 May 2005 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-1062

Summary

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods.

Vulnerable Systems

Application

  • Kerio Mailserver 6.0.0

  • Kerio Mailserver 6.0.1

  • Kerio Mailserver 6.0.2

  • Kerio Mailserver 6.0.3

  • Kerio Mailserver 6.0.4

  • Kerio Mailserver 6.0.5

  • Kerio Mailserver 6.0.6

  • Kerio Mailserver 6.0.7

  • Kerio Mailserver 6.0.8

  • Kerio Personal Firewall 4.0.10

  • Kerio Personal Firewall 4.0.11

  • Kerio Personal Firewall 4.0.12

  • Kerio Personal Firewall 4.0.13

  • Kerio Personal Firewall 4.0.14

  • Kerio Personal Firewall 4.0.15

  • Kerio Personal Firewall 4.0.16

  • Kerio Personal Firewall 4.0.7

  • Kerio Personal Firewall 4.0.8

  • Kerio Personal Firewall 4.0.9

  • Kerio Personal Firewall 4.1.0

  • Kerio Personal Firewall 4.1.1

  • Kerio Personal Firewall 4.1.2

  • Kerio Winroute Firewall 6.0.0

  • Kerio Winroute Firewall 6.0.1

  • Kerio Winroute Firewall 6.0.10

  • Kerio Winroute Firewall 6.0.2

  • Kerio Winroute Firewall 6.0.3

  • Kerio Winroute Firewall 6.0.4

  • Kerio Winroute Firewall 6.0.5

  • Kerio Winroute Firewall 6.0.6

  • Kerio Winroute Firewall 6.0.7

  • Kerio Winroute Firewall 6.0.8

  • Kerio Winroute Firewall 6.0.9


References

BUGTRAQ - 20050429 [CAN-2005-1062] Administration protocol abuse allows local/remote password cracking

CONFIRM - http://www.kerio.com/security_advisory.html

MISC - http://research.tic.udc.es/scg/advisories/20050429-1.txt


Last Updated: 27 May 2016 10:40:01