CVE-2006-5153
https://notcve.org/view.php?id=CVE-2006-5153
The (1) fwdrv.sys and (2) khips.sys drivers in Sunbelt Kerio Personal Firewall 4.3.268 and earlier do not validate arguments passed through to SSDT functions, including NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile, which allows local users to cause a denial of service (crash) and possibly other impacts via unspecified vectors. Los drivers (1) fwdrv.sys y (2) khips.sys en Sunbelt Kerio Personal Firewall 4.3.268 y anteriores no validan los argumentos pasados a través de funciones SSDT, incluyendo NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, y NtSetInformationFile, lo cual permite a usuarios locales provocar una denegación de servicio (caída) y posiblemente otros impactos mediante vectores no especificados. • http://secunia.com/advisories/22234 http://securityreason.com/securityalert/1685 http://securitytracker.com/id?1016967 http://www.matousec.com/info/advisories/Kerio-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php http://www.securityfocus.com/archive/1/447504/100/0/threaded http://www.securityfocus.com/bid/20299 http://www.vupen.com/english/advisories/2006/3872 https://exchange.xforce.ibmcloud.com/vulnerabilities/29313 •
CVE-2006-3787 – Sunbelt Kerio Personal Firewall 4.3.426 - CreateRemoteThread Denial of Service
https://notcve.org/view.php?id=CVE-2006-3787
kpf4ss.exe in Sunbelt Kerio Personal Firewall 4.3.x before 4.3.268 does not properly hook the CreateRemoteThread API function, which allows local users to cause a denial of service (crash) and bypass protection mechanisms by calling CreateRemoteThread. kpf4ss.exe en Sunbelt Kerio Personal Firewall 4.3.x anterior a 4.3.268 no se engancha adecuadamente a la función CreateRemoteThread de la API, lo cual permite a usuarios locales provocar una denegación de servicio (caída) y evitar mecanismos de protección llamando a CreateRemoteThread. • https://www.exploit-db.com/exploits/28228 http://secunia.com/advisories/21060 http://securityreason.com/securityalert/1260 http://www.matousec.com/info/advisories/Kerio-Terminating-kpf4ss-exe-using-internal-runtime-error.php http://www.securityfocus.com/archive/1/440112/100/100/threaded http://www.securityfocus.com/bid/18996 http://www.vupen.com/english/advisories/2006/2828 •
CVE-2005-1063
https://notcve.org/view.php?id=CVE-2005-1063
The administration protocol for Kerio WinRoute Firewall 6.x up to 6.0.10, Personal Firewall 4.x up to 4.1.2, and MailServer up to 6.0.8 allows remote attackers to cause a denial of service (CPU consumption) via certain attacks that force the product to "compute unexpected conditions" and "perform cryptographic operations." • http://research.tic.udc.es/scg/advisories/20050429-2.txt http://www.kerio.com/security_advisory.html http://www.securityfocus.com/archive/1/397220 •
CVE-2005-0964
https://notcve.org/view.php?id=CVE-2005-0964
Unknown vulnerability in Kerio Personal Firewall 4.1.2 and earlier allows local users to bypass firewall rules via a malicious process that impersonates a legitimate process that has fewer restrictions. • http://secunia.com/advisories/14717 http://securitytracker.com/id?1013607 http://www.kerio.com/security_advisory.html#0503 http://www.securityfocus.com/bid/12946 https://exchange.xforce.ibmcloud.com/vulnerabilities/19893 •
CVE-2004-1907 – Kerio Personal Firewall 4.0.x - Web Filtering Remote Denial of Service
https://notcve.org/view.php?id=CVE-2004-1907
The Web Filtering functionality in Kerio Personal Firewall (KPF) 4.0.13 allows remote attackers to cause a denial of service (crash) by sending hex-encoded URLs containing "%13%12%13". • https://www.exploit-db.com/exploits/23925 http://archives.neohapsis.com/archives/bugtraq/2004-04/0061.html http://marc.info/?l=bugtraq&m=108137421524251&w=2 http://secunia.com/advisories/11331 http://www.cipher.org.uk/index.php?p=advisories/HEX-Kerio_Personal_Firewall_Remote_DOS_7-04-2004.advisory http://www.securityfocus.com/bid/10075 https://exchange.xforce.ibmcloud.com/vulnerabilities/15821 •