CVE-2003-1491

Current Description

Kerio Personal Firewall (KPF) 2.1.4 has a default rule to accept incoming packets from DNS (UDP port 53), which allows remote attackers to bypass the firewall filters via packets with a source port of 53.

Basic Data

PublishedDecember 31, 2003
Last ModifiedJuly 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-94
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationKerioPersonal Firewall2.1.4*******

Vulnerable Software List

VendorProductVersions
Kerio Personal Firewall 2.1.4

References

NameSourceURLTags
20030422 UDP bypassing in Kerio Firewall 2.1.4http://archives.neohapsis.com/archives/fulldisclosure/2003-q2/0352.htmlFULLDISC
http://www.securiteam.com/securitynews/5FP0N1P9PI.htmlhttp://www.securiteam.com/securitynews/5FP0N1P9PI.htmlMISC
7436http://www.securityfocus.com/bid/7436BID
kerio-pf-firewall-bypass(11880)https://exchange.xforce.ibmcloud.com/vulnerabilities/11880XF