CVE-2005-3286
https://notcve.org/view.php?id=CVE-2005-3286
The FWDRV driver in Kerio Personal Firewall 4.2 and Server Firewall 1.1.1 allows local users to cause a denial of service (crash) by setting the PAGE_NOACCESS or PAGE_GUARD protection on the Page Environment Block (PEB), which triggers an exception, aka the "PEB lockout vulnerability." • http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/037958.html http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt http://seclists.org/bugtraq/2005/Oct/166 http://secunia.com/advisories/17155 http://securityreason.com/securityalert/78 http://www.kerio.com/security_advisory.html http://www.osvdb.org/19961 http://www.securityfocus.com/bid/15094 •
CVE-2004-1022
https://notcve.org/view.php?id=CVE-2004-1022
Kerio Winroute Firewall before 6.0.7, ServerFirewall before 1.0.1, and MailServer before 6.0.5 use symmetric encryption for user passwords, which allows attackers to decrypt the user database and obtain the passwords by extracting the secret key from within the software. Kerio Winroute Firewall anteriores a 6.0.7, ServerFirewall anteriores a 1.0.1, y MailServer anteriores a 6.0.5 usan cifrado simétrico para contraseñas de usuario, lo que permite a atacantes descifrar la base de datos de usuarios y obtener las contraseñas extrayendo la clave secreta del software. • http://marc.info/?l=bugtraq&m=110304957607578&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/18470 •
CVE-2004-1023
https://notcve.org/view.php?id=CVE-2004-1023
Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration. Kerio Winroute Firewall anteriores a 6.0.9, Server Firewall anteriores a 1.0.1, y MailServer anteriores a 6.0.5, cuando se instala en sistemas basados en Windows, no modifica las listas de control de acceso (ACL) de ficheros críticos, lo que permite a usuarios locales con privilegios de "Usuarios Avanzados" modificar programas, instalar DLLs maliciosas en la carpeta de plug-ins y modificar ficheros XML relacionados con la configuración. • http://marc.info/?l=bugtraq&m=110305387813002&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/18471 •