VAR-200601-0385

Vulnerability from variot - Updated: 2023-12-18 12:53

Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web". Kerio WinRoute Firewall is prone to a remote denial-of-service vulnerability. An attacker can exploit this vulnerability to crash the affected service, effectively disabling the firewall. This may aid in further attacks. Kerio WinRoute firewall is an enterprise gateway firewall suitable for small and medium businesses. There are loopholes in Kerio WinRoute's handling of specific web browsing operations, and remote attackers may use the loopholes to perform denial-of-service attacks on the firewall.

TITLE: Kerio WinRoute Firewall Web Browsing Denial of Service

SECUNIA ADVISORY ID: SA18589

VERIFY ADVISORY: http://secunia.com/advisories/18589/

CRITICAL: Less critical

IMPACT: DoS

WHERE:

From remote

SOFTWARE: Kerio WinRoute Firewall 6.x http://secunia.com/product/3613/

DESCRIPTION: A vulnerability has been reported in Kerio WinRoute Firewall, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

SOLUTION: Update to version 6.1.4 Patch 2. http://www.kerio.com/kwf_download.html

PROVIDED AND/OR DISCOVERED BY: Reported by vendor.

ORIGINAL ADVISORY: http://www.kerio.com/kwf_history.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200601-0385",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.1.4"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.1.3"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "kerio",
        "version": "6.1.2"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "kerio",
        "version": "5.1.8"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "kerio",
        "version": "6.0.0"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "kerio",
        "version": "5.1.6"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "kerio",
        "version": "6.1.4_patch_1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "kerio",
        "version": "5.1.9"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "kerio",
        "version": "5.1.7"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "kerio",
        "version": "5.10"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.1.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.11"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.9"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.8"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.7"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.6"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.5"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.4"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.3"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.2"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "kerio",
        "version": "6.0.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.1.3"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.1.4"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.4"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.1.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.1.2"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.7"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.1.10"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "6.0.10"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.3"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.8"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.9"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.5"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.1.5"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "6.1.0"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "6.1.3_patch1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.6"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "kerio",
        "version": "5.0.2"
      },
      {
        "model": "winroute firewall patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "6.1.41"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "6.1"
      },
      {
        "model": "winroute firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "6.0"
      },
      {
        "model": "winroute firewall patch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "kerio",
        "version": "6.1.42"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "16385"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.3_patch1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reported by the vendor.",
    "sources": [
      {
        "db": "BID",
        "id": "16385"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2006-0336",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-16444",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2006-0336",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-0336",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200601-250",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-16444",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2006-0336",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16444"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-0336"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving \"browsing the web\". Kerio WinRoute Firewall is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this vulnerability to crash the affected service, effectively disabling the firewall. This may aid in further attacks. Kerio WinRoute firewall is an enterprise gateway firewall suitable for small and medium businesses. There are loopholes in Kerio WinRoute\u0027s handling of specific web browsing operations, and remote attackers may use the loopholes to perform denial-of-service attacks on the firewall. \n\nTITLE:\nKerio WinRoute Firewall Web Browsing Denial of Service\n\nSECUNIA ADVISORY ID:\nSA18589\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/18589/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nKerio WinRoute Firewall 6.x\nhttp://secunia.com/product/3613/\n\nDESCRIPTION:\nA vulnerability has been reported in Kerio WinRoute Firewall, which\npotentially can be exploited by malicious people to cause a DoS\n(Denial of Service). \n\nSOLUTION:\nUpdate to version 6.1.4 Patch 2. \nhttp://www.kerio.com/kwf_download.html\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nhttp://www.kerio.com/kwf_history.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "db": "BID",
        "id": "16385"
      },
      {
        "db": "VULHUB",
        "id": "VHN-16444"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-0336"
      },
      {
        "db": "PACKETSTORM",
        "id": "43368"
      }
    ],
    "trust": 1.44
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "16385",
        "trust": 2.1
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0336",
        "trust": 2.1
      },
      {
        "db": "SECUNIA",
        "id": "18589",
        "trust": 1.9
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-0324",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "22631",
        "trust": 1.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "24317",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-16444",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-0336",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "43368",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16444"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-0336"
      },
      {
        "db": "BID",
        "id": "16385"
      },
      {
        "db": "PACKETSTORM",
        "id": "43368"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ]
  },
  "id": "VAR-200601-0385",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16444"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:53:31.418000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "http://www.kerio.com/kwf_history.html"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/16385"
      },
      {
        "trust": 1.8,
        "url": "http://www.osvdb.org/22631"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/18589"
      },
      {
        "trust": 1.2,
        "url": "http://www.vupen.com/english/advisories/2006/0324"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24317"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/24317"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/0324"
      },
      {
        "trust": 0.3,
        "url": "http://www.kerio.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.kerio.com/kwf_home.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3613/"
      },
      {
        "trust": 0.1,
        "url": "http://www.kerio.com/kwf_download.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/18589/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-16444"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-0336"
      },
      {
        "db": "BID",
        "id": "16385"
      },
      {
        "db": "PACKETSTORM",
        "id": "43368"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-16444"
      },
      {
        "db": "VULMON",
        "id": "CVE-2006-0336"
      },
      {
        "db": "BID",
        "id": "16385"
      },
      {
        "db": "PACKETSTORM",
        "id": "43368"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-01-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16444"
      },
      {
        "date": "2006-01-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2006-0336"
      },
      {
        "date": "2006-01-25T00:00:00",
        "db": "BID",
        "id": "16385"
      },
      {
        "date": "2006-01-25T17:27:50",
        "db": "PACKETSTORM",
        "id": "43368"
      },
      {
        "date": "2006-01-21T00:03:00",
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "date": "2006-01-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-16444"
      },
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULMON",
        "id": "CVE-2006-0336"
      },
      {
        "date": "2006-02-07T20:54:00",
        "db": "BID",
        "id": "16385"
      },
      {
        "date": "2017-07-20T01:29:40.160000",
        "db": "NVD",
        "id": "CVE-2006-0336"
      },
      {
        "date": "2006-01-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Kerio WinRoute Firewall Web Browse denial of service vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200601-250"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…