CVE-2005-1063

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kerio:kerio_mailserver:6.0:*:*:*:*:*:*:*
cpe:2.3:a:kerio:kerio_mailserver:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:kerio:kerio_mailserver:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:kerio:kerio_mailserver:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:kerio:kerio_mailserver:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:kerio:kerio_mailserver:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.1:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:kerio:personal_firewall:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () http://research.tic.udc.es/scg/advisories/20050429-2.txt - () http://research.tic.udc.es/scg/advisories/20050429-2.txt -
References () http://www.kerio.com/security_advisory.html - Patch, Vendor Advisory () http://www.kerio.com/security_advisory.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/397220 - Patch, Vendor Advisory () http://www.securityfocus.com/archive/1/397220 - Patch, Vendor Advisory

Information

Published : 2005-04-29 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-1063

Mitre link : CVE-2005-1063

CVE.ORG link : CVE-2005-1063


JSON object : View

Products Affected

kerio

  • winroute_firewall
  • personal_firewall
  • kerio_mailserver