CVE Vulnerabilities

CVE-2005-1063

Published: Apr 29, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to compute unexpected conditions and perform cryptographic operations.

Affected Software

NameVendorStart VersionEnd Version
Kerio_mailserverKerio6.0 (including)6.0 (including)
Kerio_mailserverKerio6.0.1 (including)6.0.1 (including)
Kerio_mailserverKerio6.0.2 (including)6.0.2 (including)
Kerio_mailserverKerio6.0.3 (including)6.0.3 (including)
Kerio_mailserverKerio6.0.4 (including)6.0.4 (including)
Kerio_mailserverKerio6.0.5 (including)6.0.5 (including)
Personal_firewallKerio4.0.6 (including)4.0.6 (including)
Personal_firewallKerio4.0.7 (including)4.0.7 (including)
Personal_firewallKerio4.0.8 (including)4.0.8 (including)
Personal_firewallKerio4.0.9 (including)4.0.9 (including)
Personal_firewallKerio4.0.10 (including)4.0.10 (including)
Personal_firewallKerio4.0.16 (including)4.0.16 (including)
Personal_firewallKerio4.1 (including)4.1 (including)
Personal_firewallKerio4.1.1 (including)4.1.1 (including)
Personal_firewallKerio4.1.2 (including)4.1.2 (including)
Winroute_firewallKerio6.0 (including)6.0 (including)
Winroute_firewallKerio6.0.1 (including)6.0.1 (including)
Winroute_firewallKerio6.0.2 (including)6.0.2 (including)
Winroute_firewallKerio6.0.3 (including)6.0.3 (including)
Winroute_firewallKerio6.0.4 (including)6.0.4 (including)
Winroute_firewallKerio6.0.5 (including)6.0.5 (including)
Winroute_firewallKerio6.0.6 (including)6.0.6 (including)
Winroute_firewallKerio6.0.7 (including)6.0.7 (including)
Winroute_firewallKerio6.0.8 (including)6.0.8 (including)
Winroute_firewallKerio6.0.9 (including)6.0.9 (including)

References