ID

VAR-200504-0069


CVE

CVE-2005-1063


TITLE

Kerio Management Port Denial of Service Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200504-125

DESCRIPTION

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations.". Various Kerio products are vulnerable to a denial of service vulnerability with regards to the administration port. This issue is due to a failure of the application to properly handle exceptional conditions with regards to specifically malformed data. A remote attacker may leverage these issues, without requiring authentication, to exhaust resources on an affected computer, effectively denying service for legitimate users. The vendor has addressed this issue in Kerio MailServer 6.0.9, Kerio WinRoute Firewall 6.0.11, and Kerio Personal Firewall 4.1.3; earlier versions of these products are reported vulnerable. Kerio WinRoute Firewall is an enterprise-level firewall of American Kerio Company, which provides functions such as Internet sharing, virus protection and transparent proxy

Trust: 1.26

sources: NVD: CVE-2005-1063 // BID: 13458 // VULHUB: VHN-12272

AFFECTED PRODUCTS

vendor:keriomodel:personal firewallscope:eqversion:4.0.16

Trust: 1.9

vendor:keriomodel:personal firewallscope:eqversion:4.0.10

Trust: 1.9

vendor:keriomodel:personal firewallscope:eqversion:4.0.7

Trust: 1.9

vendor:keriomodel:personal firewallscope:eqversion:4.0.6

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.5

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.4

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.3

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.2

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.1

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.9

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.8

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.7

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.6

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.5

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.4

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.3

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.2

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.1

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0

Trust: 1.3

vendor:keriomodel:personal firewallscope:eqversion:4.1.2

Trust: 1.3

vendor:keriomodel:personal firewallscope:eqversion:4.1.1

Trust: 1.3

vendor:keriomodel:personal firewallscope:eqversion:4.1

Trust: 1.3

vendor:keriomodel:personal firewallscope:eqversion:4.0.9

Trust: 1.3

vendor:keriomodel:personal firewallscope:eqversion:4.0.8

Trust: 1.3

vendor:keriomodel:winroute firewallscope:neversion:6.0.11

Trust: 0.3

vendor:keriomodel:personal firewallscope:neversion:4.1.3

Trust: 0.3

vendor:keriomodel:mailserverscope:neversion:6.0.9

Trust: 0.3

sources: BID: 13458 // CNNVD: CNNVD-200504-125 // NVD: CVE-2005-1063

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-1063
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200504-125
value: MEDIUM

Trust: 0.6

VULHUB: VHN-12272
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-1063
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-12272
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-12272 // CNNVD: CNNVD-200504-125 // NVD: CVE-2005-1063

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-1063

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200504-125

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200504-125

EXTERNAL IDS

db:NVDid:CVE-2005-1063

Trust: 2.0

db:CNNVDid:CNNVD-200504-125

Trust: 0.7

db:BUGTRAQid:20050429 [CAN-2005-1063] ADMINISTRATION PROTOCOL ABUSE LEADS TO SERVICE AND SYSTEM DENIAL OF SERVICE

Trust: 0.6

db:BIDid:13458

Trust: 0.4

db:VULHUBid:VHN-12272

Trust: 0.1

sources: VULHUB: VHN-12272 // BID: 13458 // CNNVD: CNNVD-200504-125 // NVD: CVE-2005-1063

REFERENCES

url:http://www.securityfocus.com/archive/1/397220

Trust: 1.7

url:http://www.kerio.com/security_advisory.html

Trust: 1.7

url:http://research.tic.udc.es/scg/advisories/20050429-2.txt

Trust: 1.4

url:http://www.kerio.com

Trust: 0.3

url:http://www.sunbelt-software.com/kerio.cfm

Trust: 0.3

url:http://www.kerio.com/kwf_home.html

Trust: 0.3

url: -

Trust: 0.1

sources: VULHUB: VHN-12272 // BID: 13458 // CNNVD: CNNVD-200504-125 // NVD: CVE-2005-1063

CREDITS

Javier Munoz (Secure Computer Group) is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 13458 // CNNVD: CNNVD-200504-125

SOURCES

db:VULHUBid:VHN-12272
db:BIDid:13458
db:CNNVDid:CNNVD-200504-125
db:NVDid:CVE-2005-1063

LAST UPDATE DATE

2024-08-14T14:59:23.298000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-12272date:2008-09-05T00:00:00
db:BIDid:13458date:2009-07-12T14:06:00
db:CNNVDid:CNNVD-200504-125date:2006-09-27T00:00:00
db:NVDid:CVE-2005-1063date:2008-09-05T20:48:06.627

SOURCES RELEASE DATE

db:VULHUBid:VHN-12272date:2005-04-29T00:00:00
db:BIDid:13458date:2005-05-02T00:00:00
db:CNNVDid:CNNVD-200504-125date:2005-04-29T00:00:00
db:NVDid:CVE-2005-1063date:2005-04-29T04:00:00