Kerio Personal Firewall (KPF) 2.1.4 has a default rule to accept incoming packets from DNS (UDP port 53), which allows remote attackers to bypass the firewall filters via packets with a source port of 53.
References
Configurations
History
20 Nov 2024, 23:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2003-q2/0352.html - | |
References | () http://www.securiteam.com/securitynews/5FP0N1P9PI.html - | |
References | () http://www.securityfocus.com/bid/7436 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11880 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:47
NVD link : CVE-2003-1491
Mitre link : CVE-2003-1491
CVE.ORG link : CVE-2003-1491
JSON object : View
Products Affected
kerio
- personal_firewall