ID

VAR-200605-0161


CVE

CVE-2006-2267


TITLE

Kerio WinRoute Firewall Protocol detection module Denial of service vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200605-177

DESCRIPTION

Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3. Kerio WinRoute Firewall is prone to a remote denial-of-service vulnerability. The exact cause of this issue is currently unknown. This issue affects Kerio WinRoute Firewall versions prior to 6.2.1. Kerio WinRoute Firewall is a widely popular firewall software system. ---------------------------------------------------------------------- Secunia Survey Secunia would like to invite you to participate in an electronic survey evolving the usefulness of our mailing lists. To value your effort Secunia will offer you free access to the Secunia Security Manager for three months as well as have a prize draw for an iPod nano. We hope that you will give us a few minutes of your time, as your response will help us provide you with better services in the future. The questionnaire contains 19 questions and it takes approximately 5 minutes to answer the questionnaire. https://ca.secunia.com/survey/?survey_url=kei933wBid2 The survey is being conducted in accordance with the general Secunia Security Policy and your answers will of course be kept strictly confidential. Best regards, Niels Henrik Rasmussen CEO Secunia ---------------------------------------------------------------------- TITLE: Kerio WinRoute Firewall Protocol Inspection Denial of Service SECUNIA ADVISORY ID: SA19947 VERIFY ADVISORY: http://secunia.com/advisories/19947/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote SOFTWARE: Kerio WinRoute Firewall 6.x http://secunia.com/product/3613/ DESCRIPTION: A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in the SMTP and POP3 protocol inspectors. This can be exploited to crash the service when a malformed e-mail is sent via SMTP or received via POP3. SOLUTION: Update to version 6.2.1 or later. http://www.kerio.com/kwf_download.html PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.kerio.com/kwf_history.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2006-2267 // BID: 17859 // VULHUB: VHN-18375 // PACKETSTORM: 46061

AFFECTED PRODUCTS

vendor:keriomodel:winroute firewallscope:eqversion:6.0.9

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.8

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.7

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.6

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.5

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.4

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.3

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.2

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:5.1.1

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:5.1

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.1.4

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.1.3

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.1.2

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.1.1

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.1

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.11

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.1

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.10

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.10

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.9

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.8

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.7

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.6

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.5

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.4

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.3

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.1.2

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.9

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.8

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.7

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.6

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.5

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.4

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.3

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.2

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:5.0.1

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.0

Trust: 1.0

vendor:keriomodel:winroute firewallscope:eqversion:6.1.0

Trust: 1.0

vendor:keriomodel:winroute firewallscope:eqversion:6.0.10

Trust: 1.0

vendor:keriomodel:winroute firewallscope:eqversion:6.1.4_patch_1

Trust: 1.0

vendor:keriomodel:winroute firewallscope:eqversion:6.1.3_patch1

Trust: 1.0

vendor:keriomodel:winroute firewallscope:eqversion:6.2

Trust: 0.3

vendor:keriomodel:winroute firewall patchscope:eqversion:6.1.42

Trust: 0.3

vendor:keriomodel:winroute firewall patchscope:eqversion:6.1.41

Trust: 0.3

vendor:keriomodel:winroute firewallscope:neversion:6.2.1

Trust: 0.3

sources: BID: 17859 // CNNVD: CNNVD-200605-177 // NVD: CVE-2006-2267

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2267
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200605-177
value: MEDIUM

Trust: 0.6

VULHUB: VHN-18375
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-2267
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-18375
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18375 // CNNVD: CNNVD-200605-177 // NVD: CVE-2006-2267

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2267

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200605-177

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200605-177

EXTERNAL IDS

db:BIDid:17859

Trust: 2.0

db:SECUNIAid:19947

Trust: 1.8

db:SECTRACKid:1016032

Trust: 1.7

db:NVDid:CVE-2006-2267

Trust: 1.7

db:OSVDBid:25300

Trust: 1.7

db:OSVDBid:25273

Trust: 1.7

db:VUPENid:ADV-2006-1677

Trust: 1.7

db:CNNVDid:CNNVD-200605-177

Trust: 0.7

db:XFid:26263

Trust: 0.6

db:BUGTRAQid:20060507 KERIO WINROUTE FIREWALL PROTOCOL INSPECTION DENIAL

Trust: 0.6

db:VULHUBid:VHN-18375

Trust: 0.1

db:PACKETSTORMid:46061

Trust: 0.1

sources: VULHUB: VHN-18375 // BID: 17859 // PACKETSTORM: 46061 // CNNVD: CNNVD-200605-177 // NVD: CVE-2006-2267

REFERENCES

url:http://www.kerio.com/kwf_history.html

Trust: 2.1

url:http://www.securityfocus.com/bid/17859

Trust: 1.7

url:http://www.osvdb.org/25273

Trust: 1.7

url:http://www.osvdb.org/25300

Trust: 1.7

url:http://securitytracker.com/id?1016032

Trust: 1.7

url:http://secunia.com/advisories/19947

Trust: 1.7

url:http://www.securityfocus.com/archive/1/433585/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/1677

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26263

Trust: 1.1

url:http://www.frsirt.com/english/advisories/2006/1677

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26263

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/433585/100/0/threaded

Trust: 0.6

url:http://www.kerio.com

Trust: 0.3

url:http://www.kerio.com/kwf_home.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/3613/

Trust: 0.1

url:http://www.kerio.com/kwf_download.html

Trust: 0.1

url:http://secunia.com/advisories/19947/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://ca.secunia.com/survey/?survey_url=kei933wbid2

Trust: 0.1

sources: VULHUB: VHN-18375 // BID: 17859 // PACKETSTORM: 46061 // CNNVD: CNNVD-200605-177 // NVD: CVE-2006-2267

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 17859

SOURCES

db:VULHUBid:VHN-18375
db:BIDid:17859
db:PACKETSTORMid:46061
db:CNNVDid:CNNVD-200605-177
db:NVDid:CVE-2006-2267

LAST UPDATE DATE

2024-08-14T14:53:36.850000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18375date:2018-10-18T00:00:00
db:BIDid:17859date:2006-05-05T22:50:00
db:CNNVDid:CNNVD-200605-177date:2006-05-10T00:00:00
db:NVDid:CVE-2006-2267date:2018-10-18T16:38:53.053

SOURCES RELEASE DATE

db:VULHUBid:VHN-18375date:2006-05-09T00:00:00
db:BIDid:17859date:2006-05-05T00:00:00
db:PACKETSTORMid:46061date:2006-05-05T11:43:40
db:CNNVDid:CNNVD-200605-177date:2006-05-09T00:00:00
db:NVDid:CVE-2006-2267date:2006-05-09T10:02:00