lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <41988B11.3090401@edelweb.fr> From: ruff.lists at edelweb.fr (Nicolas RUFF) Subject: EEYE: Kerio Personal Firewall Multiple IP Options Denial of Service > Does anyone actually *knows* if KPF 2 and the "Tiny" versions are > vulnerable to this? Kerio's web page says: > ... > Has anyone seen exploits for this circulating? Just tried on my box : TPF v2.0.15A built on 22/10/2001 is not vulnerable to the K-Otik exploit. http://www.k-otik.com/exploits/20041111.HOD-kerio-firewall-DoS-expl.c (BTW, I guess someone could craft a much simpler exploit with HPING ...) -Nicolas RUFF Security Consultant, EdelWeb