Vulnerabilities > CVE-2003-1491 - Configuration vulnerability in Kerio Personal Firewall 2.1.4

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Kerio Personal Firewall (KPF) 2.1.4 has a default rule to accept incoming packets from DNS (UDP port 53), which allows remote attackers to bypass the firewall filters via packets with a source port of 53.

Vulnerable Configurations

Part Description Count
Application
Kerio
1

Common Weakness Enumeration (CWE)

Nessus

NASL familyFirewalls
NASL idKERIO_PF_UDPBYPASS.NASL
descriptionIt is possible to bypass the rules of the remote firewall by sending UDP packets with a source port equal to 53. An attacker may use this flaw to inject UDP packets to the remote hosts, in spite of the presence of a firewall.
last seen2020-06-01
modified2020-06-02
plugin id11580
published2003-05-06
reporterThis script is Copyright (C) 2003-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11580
titleFirewall UDP Packet Source Port 53 Ruleset Bypass