Published: 29/04/2005 Updated: 05/09/2008
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote malicious users to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

kerio personal firewall 4.1

kerio personal firewall 4.1.1

kerio personal firewall 4.1.2

kerio winroute firewall 6.0

kerio kerio mailserver 6.0.3

kerio kerio mailserver 6.0.4

kerio kerio mailserver 6.0.5

kerio personal firewall 4.0.10

kerio personal firewall 4.0.16

kerio winroute firewall 6.0.5

kerio winroute firewall 6.0.6

kerio winroute firewall 6.0.7

kerio winroute firewall 6.0.8

kerio kerio mailserver 6.0

kerio kerio mailserver 6.0.2

kerio personal firewall 4.0.7

kerio personal firewall 4.0.9

kerio winroute firewall 6.0.1

kerio winroute firewall 6.0.3

kerio kerio mailserver 6.0.1

kerio personal firewall 4.0.6

kerio personal firewall 4.0.8

kerio winroute firewall 6.0.2

kerio winroute firewall 6.0.4

kerio winroute firewall 6.0.9