VAR-200605-0161
Vulnerability from variot - Updated: 2023-12-18 12:32Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the "email protocol inspectors," possibly (1) SMTP and (2) POP3. Kerio WinRoute Firewall is prone to a remote denial-of-service vulnerability. The exact cause of this issue is currently unknown. This issue affects Kerio WinRoute Firewall versions prior to 6.2.1. Kerio WinRoute Firewall is a widely popular firewall software system.
Secunia Survey
Secunia would like to invite you to participate in an electronic survey evolving the usefulness of our mailing lists. To value your effort Secunia will offer you free access to the Secunia Security Manager for three months as well as have a prize draw for an iPod nano.
We hope that you will give us a few minutes of your time, as your response will help us provide you with better services in the future. The questionnaire contains 19 questions and it takes approximately 5 minutes to answer the questionnaire.
https://ca.secunia.com/survey/?survey_url=kei933wBid2
The survey is being conducted in accordance with the general Secunia Security Policy and your answers will of course be kept strictly confidential.
Best regards, Niels Henrik Rasmussen CEO Secunia
TITLE: Kerio WinRoute Firewall Protocol Inspection Denial of Service
SECUNIA ADVISORY ID: SA19947
VERIFY ADVISORY: http://secunia.com/advisories/19947/
CRITICAL: Moderately critical
IMPACT: DoS
WHERE:
From remote
SOFTWARE: Kerio WinRoute Firewall 6.x http://secunia.com/product/3613/
DESCRIPTION: A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an unspecified error in the SMTP and POP3 protocol inspectors. This can be exploited to crash the service when a malformed e-mail is sent via SMTP or received via POP3.
SOLUTION: Update to version 6.2.1 or later. http://www.kerio.com/kwf_download.html
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.kerio.com/kwf_history.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200605-0161",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.9"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.8"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.7"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.6"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.5"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.11"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.10"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.10"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.9"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.8"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.7"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.6"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.5"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.9"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.8"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.7"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.6"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.5"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.0.0"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.1.4_patch_1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.0.10"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.1.0"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.1.3_patch1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "6.2"
},
{
"model": "winroute firewall patch",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "6.1.42"
},
{
"model": "winroute firewall patch",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "6.1.41"
},
{
"model": "winroute firewall",
"scope": "ne",
"trust": 0.3,
"vendor": "kerio",
"version": "6.2.1"
}
],
"sources": [
{
"db": "BID",
"id": "17859"
},
{
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.3_patch1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2267"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "17859"
}
],
"trust": 0.3
},
"cve": "CVE-2006-2267",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-18375",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2006-2267",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200605-177",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-18375",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18375"
},
{
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kerio WinRoute Firewall before 6.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors in the \"email protocol inspectors,\" possibly (1) SMTP and (2) POP3. Kerio WinRoute Firewall is prone to a remote denial-of-service vulnerability. The exact cause of this issue is currently unknown. \nThis issue affects Kerio WinRoute Firewall versions prior to 6.2.1. Kerio WinRoute Firewall is a widely popular firewall software system. \n\n----------------------------------------------------------------------\n\nSecunia Survey\n\nSecunia would like to invite you to participate in an electronic survey\nevolving the usefulness of our mailing lists. To value your effort\nSecunia will offer you free access to the Secunia Security Manager for\nthree months as well as have a prize draw for an iPod nano. \n\nWe hope that you will give us a few minutes of your time, as your\nresponse will help us provide you with better services in the future. \nThe questionnaire contains 19 questions and it takes approximately 5\nminutes to answer the questionnaire. \n\nhttps://ca.secunia.com/survey/?survey_url=kei933wBid2\n\nThe survey is being conducted in accordance with the general Secunia\nSecurity Policy and your answers will of course be kept strictly\nconfidential. \n\n\nBest regards,\nNiels Henrik Rasmussen\nCEO Secunia\n\n----------------------------------------------------------------------\n\nTITLE:\nKerio WinRoute Firewall Protocol Inspection Denial of Service\n\nSECUNIA ADVISORY ID:\nSA19947\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/19947/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nKerio WinRoute Firewall 6.x\nhttp://secunia.com/product/3613/\n\nDESCRIPTION:\nA vulnerability has been reported in Kerio WinRoute Firewall, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an unspecified error in the SMTP\nand POP3 protocol inspectors. This can be exploited to crash the\nservice when a malformed e-mail is sent via SMTP or received via\nPOP3. \n\nSOLUTION:\nUpdate to version 6.2.1 or later. \nhttp://www.kerio.com/kwf_download.html\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.kerio.com/kwf_history.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"db": "BID",
"id": "17859"
},
{
"db": "VULHUB",
"id": "VHN-18375"
},
{
"db": "PACKETSTORM",
"id": "46061"
}
],
"trust": 1.35
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "17859",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "19947",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1016032",
"trust": 1.7
},
{
"db": "NVD",
"id": "CVE-2006-2267",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "25300",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "25273",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2006-1677",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200605-177",
"trust": 0.7
},
{
"db": "XF",
"id": "26263",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20060507 KERIO WINROUTE FIREWALL PROTOCOL INSPECTION DENIAL",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-18375",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "46061",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18375"
},
{
"db": "BID",
"id": "17859"
},
{
"db": "PACKETSTORM",
"id": "46061"
},
{
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
]
},
"id": "VAR-200605-0161",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-18375"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:32:42.338000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2267"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://www.kerio.com/kwf_history.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/17859"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/25273"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/25300"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1016032"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/19947"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/433585/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/1677"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26263"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2006/1677"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/26263"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/433585/100/0/threaded"
},
{
"trust": 0.3,
"url": "http://www.kerio.com"
},
{
"trust": 0.3,
"url": "http://www.kerio.com/kwf_home.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/3613/"
},
{
"trust": 0.1,
"url": "http://www.kerio.com/kwf_download.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/19947/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/survey/?survey_url=kei933wbid2"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18375"
},
{
"db": "BID",
"id": "17859"
},
{
"db": "PACKETSTORM",
"id": "46061"
},
{
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-18375"
},
{
"db": "BID",
"id": "17859"
},
{
"db": "PACKETSTORM",
"id": "46061"
},
{
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-05-09T00:00:00",
"db": "VULHUB",
"id": "VHN-18375"
},
{
"date": "2006-05-05T00:00:00",
"db": "BID",
"id": "17859"
},
{
"date": "2006-05-05T11:43:40",
"db": "PACKETSTORM",
"id": "46061"
},
{
"date": "2006-05-09T10:02:00",
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"date": "2006-05-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-18T00:00:00",
"db": "VULHUB",
"id": "VHN-18375"
},
{
"date": "2006-05-05T22:50:00",
"db": "BID",
"id": "17859"
},
{
"date": "2018-10-18T16:38:53.053000",
"db": "NVD",
"id": "CVE-2006-2267"
},
{
"date": "2006-05-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kerio WinRoute Firewall Protocol detection module Denial of service vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200605-177"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.