exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 19947

Secunia Security Advisory 19947
Posted May 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 234d2cd50d442335cd1fb5870bf64689b71927d9e2c7cbb233137bd9e7cd0520

Secunia Security Advisory 19947

Change Mirror Download


----------------------------------------------------------------------

Secunia Survey

Secunia would like to invite you to participate in an electronic survey
evolving the usefulness of our mailing lists. To value your effort
Secunia will offer you free access to the Secunia Security Manager for
three months as well as have a prize draw for an iPod nano.

We hope that you will give us a few minutes of your time, as your
response will help us provide you with better services in the future.
The questionnaire contains 19 questions and it takes approximately 5
minutes to answer the questionnaire.

https://ca.secunia.com/survey/?survey_url=kei933wBid2

The survey is being conducted in accordance with the general Secunia
Security Policy and your answers will of course be kept strictly
confidential.


Best regards,
Niels Henrik Rasmussen
CEO Secunia

----------------------------------------------------------------------

TITLE:
Kerio WinRoute Firewall Protocol Inspection Denial of Service

SECUNIA ADVISORY ID:
SA19947

VERIFY ADVISORY:
http://secunia.com/advisories/19947/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
>From remote

SOFTWARE:
Kerio WinRoute Firewall 6.x
http://secunia.com/product/3613/

DESCRIPTION:
A vulnerability has been reported in Kerio WinRoute Firewall, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

The vulnerability is caused due to an unspecified error in the SMTP
and POP3 protocol inspectors. This can be exploited to crash the
service when a malformed e-mail is sent via SMTP or received via
POP3.

The vulnerability has been reported in versions prior to 6.2.1.

SOLUTION:
Update to version 6.2.1 or later.
http://www.kerio.com/kwf_download.html

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
http://www.kerio.com/kwf_history.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close