CVE-2006-0336

Current Description

Kerio WinRoute Firewall before 6.1.4 Patch 2 allows attackers to cause a denial of service (CPU consumption and hang) via unknown vectors involving "browsing the web".

Basic Data

PublishedJanuary 21, 2006
Last ModifiedJuly 20, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationKerioWinroute Firewall5.0.1*******
    2.3ApplicationKerioWinroute Firewall5.0.2*******
    2.3ApplicationKerioWinroute Firewall5.0.3*******
    2.3ApplicationKerioWinroute Firewall5.0.4*******
    2.3ApplicationKerioWinroute Firewall5.0.5*******
    2.3ApplicationKerioWinroute Firewall5.0.6*******
    2.3ApplicationKerioWinroute Firewall5.0.7*******
    2.3ApplicationKerioWinroute Firewall5.0.8*******
    2.3ApplicationKerioWinroute Firewall5.0.9*******
    2.3ApplicationKerioWinroute Firewall5.1*******
    2.3ApplicationKerioWinroute Firewall5.1.1*******
    2.3ApplicationKerioWinroute Firewall5.1.2*******
    2.3ApplicationKerioWinroute Firewall5.1.3*******
    2.3ApplicationKerioWinroute Firewall5.1.4*******
    2.3ApplicationKerioWinroute Firewall5.1.5*******
    2.3ApplicationKerioWinroute Firewall5.1.6*******
    2.3ApplicationKerioWinroute Firewall5.1.7*******
    2.3ApplicationKerioWinroute Firewall5.1.8*******
    2.3ApplicationKerioWinroute Firewall5.1.9*******
    2.3ApplicationKerioWinroute Firewall5.1.10*******
    2.3ApplicationKerioWinroute Firewall5.10*******
    2.3ApplicationKerioWinroute Firewall6.0.0*******
    2.3ApplicationKerioWinroute Firewall6.0.1*******
    2.3ApplicationKerioWinroute Firewall6.0.2*******
    2.3ApplicationKerioWinroute Firewall6.0.3*******
    2.3ApplicationKerioWinroute Firewall6.0.4*******
    2.3ApplicationKerioWinroute Firewall6.0.5*******
    2.3ApplicationKerioWinroute Firewall6.0.6*******
    2.3ApplicationKerioWinroute Firewall6.0.7*******
    2.3ApplicationKerioWinroute Firewall6.0.8*******
    2.3ApplicationKerioWinroute Firewall6.0.9*******
    2.3ApplicationKerioWinroute Firewall6.0.10*******
    2.3ApplicationKerioWinroute Firewall6.0.11*******
    2.3ApplicationKerioWinroute Firewall6.1.0*******
    2.3ApplicationKerioWinroute Firewall6.1.1*******
    2.3ApplicationKerioWinroute Firewall6.1.2*******
    2.3ApplicationKerioWinroute Firewall6.1.3*******
    2.3ApplicationKerioWinroute Firewall6.1.3_patch1*******
    2.3ApplicationKerioWinroute Firewall6.1.4*******
    2.3ApplicationKerioWinroute Firewall6.1.4_patch_1*******

Vulnerable Software List

VendorProductVersions
Kerio Winroute Firewall 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.1, 5.1.1, 5.1.10, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.1.7, 5.1.8, 5.1.9, 5.10, 6.0.0, 6.0.1, 6.0.10, 6.0.11, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.3_patch1, 6.1.4, 6.1.4_patch_1

References

NameSourceURLTags
18589http://secunia.com/advisories/18589SECUNIA
http://www.kerio.com/kwf_history.htmlhttp://www.kerio.com/kwf_history.htmlCONFIRM
22631http://www.osvdb.org/22631OSVDB
16385http://www.securityfocus.com/bid/16385BID
ADV-2006-0324http://www.vupen.com/english/advisories/2006/0324VUPEN
kerio-winroute-browsing-dos(24317)https://exchange.xforce.ibmcloud.com/vulnerabilities/24317XF