The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote malicious users to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
kerio personal firewall 4.1 |
||
kerio personal firewall 4.1.1 |
||
kerio personal firewall 4.1.2 |
||
kerio winroute firewall 6.0 |
||
kerio kerio mailserver 6.0.3 |
||
kerio kerio mailserver 6.0.4 |
||
kerio kerio mailserver 6.0.5 |
||
kerio personal firewall 4.0.10 |
||
kerio personal firewall 4.0.16 |
||
kerio winroute firewall 6.0.5 |
||
kerio winroute firewall 6.0.6 |
||
kerio winroute firewall 6.0.7 |
||
kerio winroute firewall 6.0.8 |
||
kerio kerio mailserver 6.0 |
||
kerio kerio mailserver 6.0.2 |
||
kerio personal firewall 4.0.7 |
||
kerio personal firewall 4.0.9 |
||
kerio winroute firewall 6.0.1 |
||
kerio winroute firewall 6.0.3 |
||
kerio kerio mailserver 6.0.1 |
||
kerio personal firewall 4.0.6 |
||
kerio personal firewall 4.0.8 |
||
kerio winroute firewall 6.0.2 |
||
kerio winroute firewall 6.0.4 |
||
kerio winroute firewall 6.0.9 |