7 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 18EXPL: 2

03 Oct 2006 — The (1) fwdrv.sys and (2) khips.sys drivers in Sunbelt Kerio Personal Firewall 4.3.268 and earlier do not validate arguments passed through to SSDT functions, including NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile, which allows local users to cause a denial of service (crash) and possibly other impacts via unspecified vectors. Los drivers (1) fwdrv.sys y (2) khips.sys en Sunbelt Kerio Personal Firewall 4.3.268 y anteriores no validan los argumentos pasad... • http://secunia.com/advisories/22234 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

21 Jul 2006 — kpf4ss.exe in Sunbelt Kerio Personal Firewall 4.3.x before 4.3.268 does not properly hook the CreateRemoteThread API function, which allows local users to cause a denial of service (crash) and bypass protection mechanisms by calling CreateRemoteThread. kpf4ss.exe en Sunbelt Kerio Personal Firewall 4.3.x anterior a 4.3.268 no se engancha adecuadamente a la función CreateRemoteThread de la API, lo cual permite a usuarios locales provocar una denegación de servicio (caída) y evitar mecanismos de protección lla... • https://www.exploit-db.com/exploits/28228 •

CVSS: 9.1EPSS: 0%CPEs: 33EXPL: 0

29 Apr 2005 — The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to quickly obtain passwords that are 5 characters or less via brute force methods. • http://research.tic.udc.es/scg/advisories/20050429-1.txt •

CVSS: 7.5EPSS: 0%CPEs: 25EXPL: 0

29 Apr 2005 — The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations." • http://research.tic.udc.es/scg/advisories/20050429-2.txt •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

03 Apr 2005 — Unknown vulnerability in Kerio Personal Firewall 4.1.2 and earlier allows local users to bypass firewall rules via a malicious process that impersonates a legitimate process that has fewer restrictions. • http://secunia.com/advisories/14717 •

CVSS: 7.5EPSS: 4%CPEs: 8EXPL: 2

01 Dec 2004 — The FWDRV.SYS driver in Kerio Personal Firewall 4.1.1 and earlier allows remote attackers to cause a denial of service (CPU consumption and system freeze from infinite loop) via a (1) TCP, (2) UDP, or (3) ICMP packet with a zero length IP Option field. • https://www.exploit-db.com/exploits/626 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 1

02 Sep 2004 — Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable. • http://marc.info/?l=bugtraq&m=109420310631039&w=2 •