Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-1063

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2005-1063
Last Modified 05 Sep 2008 04:48:06
Published 29 Apr 2005 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-1063

Summary

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."

Vulnerable Systems

Application

  • Kerio Mailserver 6.0

  • Kerio Mailserver 6.0.1

  • Kerio Mailserver 6.0.2

  • Kerio Mailserver 6.0.3

  • Kerio Mailserver 6.0.4

  • Kerio Mailserver 6.0.5

  • Kerio Personal Firewall 4.0.10

  • Kerio Personal Firewall 4.0.16

  • Kerio Personal Firewall 4.0.6

  • Kerio Personal Firewall 4.0.7

  • Kerio Personal Firewall 4.0.8

  • Kerio Personal Firewall 4.0.9

  • Kerio Personal Firewall 4.1

  • Kerio Personal Firewall 4.1.1

  • Kerio Personal Firewall 4.1.2

  • Kerio Winroute Firewall 6.0

  • Kerio Winroute Firewall 6.0.1

  • Kerio Winroute Firewall 6.0.2

  • Kerio Winroute Firewall 6.0.3

  • Kerio Winroute Firewall 6.0.4

  • Kerio Winroute Firewall 6.0.5

  • Kerio Winroute Firewall 6.0.6

  • Kerio Winroute Firewall 6.0.7

  • Kerio Winroute Firewall 6.0.8

  • Kerio Winroute Firewall 6.0.9


References

BUGTRAQ - 20050429 [CAN-2005-1063] Administration protocol abuse leads to Service and System Denial of Service

CONFIRM - http://www.kerio.com/security_advisory.html


Last Updated: 27 May 2016 10:40:02