Description
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations."
Product(s):
- Kerio MailServer 6.0.1
- Kerio MailServer 6.0.2
- Kerio MailServer 6.0.3
- Kerio Kerio MailServer 6.0.4
- Kerio Kerio MailServer 6.0.5
- Kerio Kerio MailServer 6.0
- Kerio Personal Firewall 4.0.10
- Kerio Personal Firewall 4.0.16
- Kerio Personal Firewall 4.0.6
- Kerio Personal Firewall 4.0.7
- Kerio Personal Firewall 4.0.8
- Kerio Personal Firewall 4.0.9
- Kerio Personal Firewall 4.1.1
- Kerio Personal Firewall 4.1.2
- Kerio Personal Firewall 4.1
- Kerio WinRoute Firewall 6.0.1
- Kerio WinRoute Firewall 6.0.2
- Kerio WinRoute Firewall 6.0.3
- Kerio WinRoute Firewall 6.0.4
- Kerio WinRoute Firewall 6.0.5
- Kerio WinRoute Firewall 6.0.6
- Kerio WinRoute Firewall 6.0.7
- Kerio WinRoute Firewall 6.0.8
- Kerio WinRoute Firewall 6.0.9
- Kerio WinRoute Firewall 6.0
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1063, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1063 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.