lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <19F34051C5BB60429ACD1BF01338C59897A878@av-mail01.corp.int-eeye.com>
From: mmaiffret at eeye.com (Marc Maiffret)
Subject: EEYE: Kerio Personal Firewall Multiple IP Options Denial of Service

Tiny Personal Firewall 6.0 was tested immediately after we had discovered the Kerio bug and the issue did/does not exist in the current version of Tiny Personal Firewall 6.0. Only versions of Kerio Personal Firewall 4.0.0 - 4.1.1 are affected by the IP Options bug.

Signed,
Marc Maiffret
Chief Hacking Officer
eEye Digital Security
T.949.349.9062
F.949.349.9538
http://eEye.com/Retina - Network Security Scanner
http://eEye.com/Iris - Network Traffic Analyzer
http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities 

Important Notice: This email is confidential, may be legally privileged, and is for the intended recipient only. Access, disclosure, copying, distribution, or reliance on any of it by anyone else is prohibited and may be a criminal offense.  Please delete if obtained in error and email confirmation to the sender. 

| -----Original Message-----
| From: full-disclosure-admin@...ts.netsys.com 
| [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of 
| J?rg Klemenz
| Sent: Thursday, November 11, 2004 2:20 PM
| To: Full-Disclosure
| Subject: Re: [Full-Disclosure] EEYE: Kerio Personal Firewall 
| Multiple IP Options Denial of Service
| 
| n3td3v schrieb:
| > On Tue, 9 Nov 2004 10:38:13 -0800, Marc Maiffret 
| <mmaiffret@...e.com> wrote:
| > 
| >>Systems Affected:
| >>Kerio Personal Firewall 4.1.1 and prior
| > 
| > I assume you are not aware of the history of Kerio and how alot of 
| > consumers maybe still on "Tiny" versions of the code.
| > 
| > Tiny Personal Firewall (all versions will also be vulnerable from 
| > this.)
| 
| Does anyone actually *knows* if KPF 2 and the "Tiny" versions 
| are vulnerable to this? Kerio's web page says:
| 
| "Affected products: Kerio Personal Firewall versions 4.0.0 thru 4.1.1"
| 
| This indicates that the error was introduced in version 4, 
| whereas Eeye says "4.1.1 and prior".
| 
| Has anyone seen exploits for this circulating?
| 
| TIA
| 
| --
| joerg klemenz <joerg@....net>
| 
| _______________________________________________
| Full-Disclosure - We believe in it.
| Charter: http://lists.netsys.com/full-disclosure-charter.html
| 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ