Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12563
HistoryMay 06, 2006 - 12:00 a.m.

[SA19947] Kerio WinRoute Firewall Protocol Inspection Denial of Service

2006-05-0600:00:00
vulners.com
10

Secunia Survey

Secunia would like to invite you to participate in an electronic survey
evolving the usefulness of our mailing lists. To value your effort
Secunia will offer you free access to the Secunia Security Manager for
three months as well as have a prize draw for an iPod nano.

We hope that you will give us a few minutes of your time, as your
response will help us provide you with better services in the future.
The questionnaire contains 19 questions and it takes approximately 5
minutes to answer the questionnaire.

https://ca.secunia.com/survey/?survey_url=kei933wBid2

The survey is being conducted in accordance with the general Secunia
Security Policy and your answers will of course be kept strictly
confidential.

Best regards,
Niels Henrik Rasmussen
CEO Secunia


TITLE:
Kerio WinRoute Firewall Protocol Inspection Denial of Service

SECUNIA ADVISORY ID:
SA19947

VERIFY ADVISORY:
http://secunia.com/advisories/19947/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
>From remote

SOFTWARE:
Kerio WinRoute Firewall 6.x
http://secunia.com/product/3613/

DESCRIPTION:
A vulnerability has been reported in Kerio WinRoute Firewall, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

The vulnerability is caused due to an unspecified error in the SMTP
and POP3 protocol inspectors. This can be exploited to crash the
service when a malformed e-mail is sent via SMTP or received via
POP3.

The vulnerability has been reported in versions prior to 6.2.1.

SOLUTION:
Update to version 6.2.1 or later.
http://www.kerio.com/kwf_download.html

PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.

ORIGINAL ADVISORY:
http://www.kerio.com/kwf_history.html


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.