ID

VAR-200412-0260


CVE

CVE-2004-2483


TITLE

Kerio WinRoute Multiple undefined remote vulnerabilities in firmware

Trust: 0.6

sources: CNNVD: CNNVD-200412-708

DESCRIPTION

Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss). Multiple unspecified remote vulnerabilities reportedly affect Kerio's WinRoute Firewall. These issues are likely due to design errors and a failure or the application to properly handle malformed network data, although this is not verified. The first issue is a remote denial of service that may cause the affected computer to crash or hang. The second issue is a DNS cache poisoning vulnerability. The final issue is an information disclosure vulnerability. An attacker may exploit these issues to gain access to otherwise restricted information and manipulate the DNS cache of the affected firewall, potentially facilitating further attacks against the affected network. Also an attacker may leverage these issues to cause the affected computer to crash or hang, facilitating a denial of service condition. TITLE: Kerio WinRoute Firewall Unspecified DNS Cache Poisoning Vulnerability SECUNIA ADVISORY ID: SA13374 VERIFY ADVISORY: http://secunia.com/advisories/13374/ CRITICAL: Moderately critical IMPACT: Spoofing, Manipulation of data WHERE: >From remote SOFTWARE: Kerio WinRoute Firewall 6.x http://secunia.com/product/3613/ DESCRIPTION: A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to poison the DNS cache. The vulnerability is caused due to an unspecified error and can be exploited to insert fake information in the DNS cache. The vulnerability has been reported in version 6.0.8. Prior versions may also be affected. NOTE: Other issues have also been fixed, where some may be security related. SOLUTION: Update to version 6.0.9. http://www.kerio.com/kwf_download.html PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2004-2483 // BID: 11870 // VULHUB: VHN-10911 // PACKETSTORM: 35286

AFFECTED PRODUCTS

vendor:keriomodel:winroute firewallscope:eqversion:6.0.8

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.7

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.6

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.5

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.4

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.3

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.2

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.1

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0

Trust: 1.9

vendor:keriomodel:winroute firewallscope:neversion:6.0.9

Trust: 0.3

sources: BID: 11870 // CNNVD: CNNVD-200412-708 // NVD: CVE-2004-2483

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-2483
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200412-708
value: MEDIUM

Trust: 0.6

VULHUB: VHN-10911
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-2483
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-10911
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-10911 // CNNVD: CNNVD-200412-708 // NVD: CVE-2004-2483

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-2483

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200412-708

TYPE

Design Error

Trust: 0.9

sources: BID: 11870 // CNNVD: CNNVD-200412-708

EXTERNAL IDS

db:BIDid:11870

Trust: 2.0

db:SECUNIAid:13374

Trust: 1.8

db:NVDid:CVE-2004-2483

Trust: 1.7

db:OSVDBid:12294

Trust: 1.7

db:OSVDBid:12293

Trust: 1.7

db:CNNVDid:CNNVD-200412-708

Trust: 0.7

db:XFid:18410

Trust: 0.6

db:VULHUBid:VHN-10911

Trust: 0.1

db:PACKETSTORMid:35286

Trust: 0.1

sources: VULHUB: VHN-10911 // BID: 11870 // PACKETSTORM: 35286 // CNNVD: CNNVD-200412-708 // NVD: CVE-2004-2483

REFERENCES

url:http://www.securityfocus.com/bid/11870

Trust: 1.7

url:http://www.kerio.com/security_advisory.html

Trust: 1.7

url:http://www.osvdb.org/12293

Trust: 1.7

url:http://www.osvdb.org/12294

Trust: 1.7

url:http://secunia.com/advisories/13374

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/18410

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/18410

Trust: 0.6

url:http://www.kerio.com

Trust: 0.3

url:http://www.kerio.com/kwf_home.html

Trust: 0.3

url:http://www.kerio.com/kwf_history.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/3613/

Trust: 0.1

url:http://www.kerio.com/kwf_download.html

Trust: 0.1

url:http://secunia.com/advisories/13374/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-10911 // BID: 11870 // PACKETSTORM: 35286 // CNNVD: CNNVD-200412-708 // NVD: CVE-2004-2483

CREDITS

The individual or individuals responsible for the discovery of these issues are currently unknown; the vendor disclosed these issues.

Trust: 0.9

sources: BID: 11870 // CNNVD: CNNVD-200412-708

SOURCES

db:VULHUBid:VHN-10911
db:BIDid:11870
db:PACKETSTORMid:35286
db:CNNVDid:CNNVD-200412-708
db:NVDid:CVE-2004-2483

LAST UPDATE DATE

2024-08-14T15:09:54.423000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-10911date:2017-07-11T00:00:00
db:BIDid:11870date:2004-12-10T00:00:00
db:CNNVDid:CNNVD-200412-708date:2005-10-20T00:00:00
db:NVDid:CVE-2004-2483date:2017-07-11T01:31:56.310

SOURCES RELEASE DATE

db:VULHUBid:VHN-10911date:2004-12-31T00:00:00
db:BIDid:11870date:2004-12-10T00:00:00
db:PACKETSTORMid:35286date:2004-12-12T19:36:48
db:CNNVDid:CNNVD-200412-708date:2004-12-31T00:00:00
db:NVDid:CVE-2004-2483date:2004-12-31T05:00:00