VAR-200712-0222
Vulnerability from variot - Updated: 2023-12-18 13:53The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries. Kerio WinRoute Firewall is prone to an unspecified weakness that allows local users to bypass proxy authentication. Exploiting this issue may permit a local attacker to obtain web pages that are supposed to be administratively prohibited with proxy controls. Versions prior to Kerio WinRoute Firewall 6.4.1 contain this weakness.
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
SOLUTION: Update to version 6.4.1. http://www.kerio.com/kwf_download.html
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.kerio.com/kwf_history.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200712-0222",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "6.0.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.10"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.9"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.8"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.7"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.6"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.5"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.9,
"vendor": "kerio",
"version": "5.1.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.2.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.2.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.2.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.11"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.9"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.8"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.7"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.6"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.5"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "6.0"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.10"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.9"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.8"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.7"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.6"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.5"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.4"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.3"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "kerio",
"version": "5.0.1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.1.4_patch_1"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.3.1"
},
{
"model": "winroute firewall",
"scope": "lte",
"trust": 1.0,
"vendor": "kerio",
"version": "6.4.0"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.1.4_patch_2"
},
{
"model": "winroute firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "kerio",
"version": "6.3.0"
},
{
"model": "winroute firewall",
"scope": "lt",
"trust": 0.8,
"vendor": "kerio",
"version": "6.4.1"
},
{
"model": "winroute firewall patch",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "6.1.42"
},
{
"model": "winroute firewall patch",
"scope": "eq",
"trust": 0.3,
"vendor": "kerio",
"version": "6.1.41"
},
{
"model": "winroute firewall",
"scope": "ne",
"trust": 0.3,
"vendor": "kerio",
"version": "6.4.1"
}
],
"sources": [
{
"db": "BID",
"id": "26851"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.4_patch_2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:6.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:kerio:winroute_firewall:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.4.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-6385"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor disclosed this issue.",
"sources": [
{
"db": "BID",
"id": "26851"
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
],
"trust": 0.9
},
"cve": "CVE-2007-6385",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 2.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2007-6385",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-29747",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-6385",
"trust": 1.8,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-200712-163",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-29747",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-29747"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The proxy server in Kerio WinRoute Firewall before 6.4.1 does not properly enforce authentication for HTTPS pages, which has unknown impact and attack vectors. NOTE: it is not clear whether this issue crosses privilege boundaries. Kerio WinRoute Firewall is prone to an unspecified weakness that allows local users to bypass proxy authentication. \nExploiting this issue may permit a local attacker to obtain web pages that are supposed to be administratively prohibited with proxy controls. \nVersions prior to Kerio WinRoute Firewall 6.4.1 contain this weakness. \n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nSOLUTION:\nUpdate to version 6.4.1. \nhttp://www.kerio.com/kwf_download.html\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.kerio.com/kwf_history.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"db": "BID",
"id": "26851"
},
{
"db": "VULHUB",
"id": "VHN-29747"
},
{
"db": "PACKETSTORM",
"id": "61822"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-6385",
"trust": 2.8
},
{
"db": "BID",
"id": "26851",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "28072",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1019095",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "42122",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2007-4212",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722",
"trust": 0.8
},
{
"db": "XF",
"id": "39020",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-29747",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "61822",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-29747"
},
{
"db": "BID",
"id": "26851"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"db": "PACKETSTORM",
"id": "61822"
},
{
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
]
},
"id": "VAR-200712-0222",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-29747"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:53:57.074000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Kerio Control ? Release History",
"trust": 0.8,
"url": "http://www.kerio.com/control/history"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-29747"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"db": "NVD",
"id": "CVE-2007-6385"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://www.kerio.com/kwf_history.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/26851"
},
{
"trust": 1.7,
"url": "http://osvdb.org/42122"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1019095"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/28072"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/4212"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39020"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6385"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6385"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2007/4212"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/39020"
},
{
"trust": 0.3,
"url": "http://www.kerio.com"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/3613/"
},
{
"trust": 0.1,
"url": "http://www.kerio.com/kwf_download.html"
},
{
"trust": 0.1,
"url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/28072/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-29747"
},
{
"db": "BID",
"id": "26851"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"db": "PACKETSTORM",
"id": "61822"
},
{
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-29747"
},
{
"db": "BID",
"id": "26851"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"db": "PACKETSTORM",
"id": "61822"
},
{
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-12-15T00:00:00",
"db": "VULHUB",
"id": "VHN-29747"
},
{
"date": "2007-12-13T00:00:00",
"db": "BID",
"id": "26851"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"date": "2007-12-14T00:12:58",
"db": "PACKETSTORM",
"id": "61822"
},
{
"date": "2007-12-15T02:46:00",
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"date": "2007-12-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-08T00:00:00",
"db": "VULHUB",
"id": "VHN-29747"
},
{
"date": "2015-05-07T17:34:00",
"db": "BID",
"id": "26851"
},
{
"date": "2012-09-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-004722"
},
{
"date": "2017-08-08T01:29:07.650000",
"db": "NVD",
"id": "CVE-2007-6385"
},
{
"date": "2007-12-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "26851"
},
{
"db": "PACKETSTORM",
"id": "61822"
},
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
],
"trust": 1.0
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kerio WinRoute Firewall Proxy server vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-004722"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200712-163"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.