lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060507065220.31226.qmail@securityfocus.com>
Date: 7 May 2006 06:52:20 -0000
From: SnoBMSN@...mail.De
To: bugtraq@...urityfocus.com
Subject: Kerio WinRoute Firewall Protocol Inspection Denial


Critical: 
Moderately critical
Impact: DoS
Where: From remote
Solution Status: Vendor Patch

Software: Kerio WinRoute Firewall 6.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

Description:
A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error in the SMTP and POP3 protocol inspectors. This can be exploited to crash the service when a malformed e-mail is sent via SMTP or received via POP3.

The vulnerability has been reported in versions prior to 6.2.1.

Solution:
Update to version 6.2.1 or later.
http://www.kerio.com/kwf_download.html

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
http://www.kerio.com/kwf_history.html

Adivosory: WwW.Cyber-Security.ORG

Turkish Hacking & Security 

By SnoB

EyvAllah!


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ