S-192: Kerio MailServer Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-192: Kerio MailServer Vulnerabilities
# 1  
Old 02-21-2008
S-192: Kerio MailServer Vulnerabilities

Kerio mailServer is prone to multiple unspecified vulnerabilities. The risk is MEDIUM. Attackers can exploit these issues to cause denial-of-service conditions or potentially execute arbitrary code in the context of the application; other attacks are also possible.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Cybersecurity

DSL Modem 192.168.a.b botnet member me?

I need a hint or a clue. Some four weeks or even more I try to change the password for my wifi access of the DSL Router without success. I access 192.168.x.x and filling in username as well as the password I am stuck. Literally nothing happens and the support line tells me that this is not... (2 Replies)
Discussion started by: 1in10
2 Replies

2. Red Hat

How to expose a box on the 63.x subnet with a route to the 192?

Hi all, I'm trying to expose a CentOS box on the 63.x subnet with a route to the 192 as our firewall doesn't allow a VPN. Would someone please let me know how I can do this? Thanks (0 Replies)
Discussion started by: tezarin
0 Replies

3. Linux

configure mailserver

Hi , I am using windows xp as my web server and domain hosting with godaddy.com My issue is , i want to create mailserver in linux for my website is it possible? (1 Reply)
Discussion started by: harishindn
1 Replies

4. Solaris

How to configure mailserver

Hi All, Can you please help me in configuring mail server on Solaris 10? Will appreciate if I can get some link which can explain the steps Thanks (3 Replies)
Discussion started by: kumarmani
3 Replies

5. IP Networking

publishing 192.168 address internally

OK this is what I want to do: On server1 I want to type <ping server2> and be able to get: pinging 192.168.0.12 ...... etc. and by server2, I mean one-word, not server2.example.com I know if I add the addresses to /etc/hosts I can achieve this, but I would like to not have to update all... (2 Replies)
Discussion started by: vertical98
2 Replies

6. Linux

mailserver

I have a mail server that I have just finished setting up and now the problem is telneting to it from a window desktop which is on the same network. Ive edited etc/mail/sendmail.mc by removing the loopback address with my desktop IP. then I restarted my service mail: shutting down sendmail: ... (1 Reply)
Discussion started by: keliy1
1 Replies

7. UNIX for Dummies Questions & Answers

Mailserver problems.

I seem to be having some troubles with my mailserver. Sendmail is working properly as far as I can tell, and so is IMAP and POP3, but whenever I try to log in via IMAP or POP3 I get an incorrect password error even though Iam using the proper password. Ive even tried telnet which yields this: $... (2 Replies)
Discussion started by: djtrippin
2 Replies

8. IP Networking

mailserver

hi I want to setup pop3 server, so i can accept incoming mail with my own domainname for example stormpie@my-domain.org the unix server is in a windows2000 network, behind a win2000 router not in domain, how can i do this?? plz help me greetz (1 Reply)
Discussion started by: Stormpie
1 Replies

9. UNIX for Dummies Questions & Answers

Mailserver Requirements

Hello, I want to setup a mailserver for an company having 25 users presentlly. Basically i am setting up first time. I want to know what are the minimum requirement for a mail server ie 1. Whether we require a domain name ( we can have our own domain name?) 2. whether we require a legal IP... (1 Reply)
Discussion started by: bache_gowda
1 Replies
Login or Register to Ask a Question
ipsecesp(7P)							     Protocols							      ipsecesp(7P)

NAME
ipsecesp, ESP - IPsec Encapsulating Security Payload SYNOPSIS
drv/ipsecesp DESCRIPTION
The ipsecesp module provides confidentiality, integrity, authentication, and partial sequence integrity (replay protection) to IP data- grams. The encapsulating security payload (ESP) encapsulates its data, enabling it to protect data that follows in the datagram. For TCP packets, ESP encapsulates the TCP header and its data only. If the packet is an IP in IP datagram, ESP protects the inner IP datagram. Per-socket policy allows "self-encapsulation" so ESP can encapsulate IP options when necessary. See ipsec(7P). Unlike the authentication header (AH), ESP allows multiple varieties of datagram protection. (Using a single datagram protection form can expose vulnerabilities.) For example, only ESP can be used to provide confidentiality. But protecting confidentiality alone exposes vulner- abilities in both replay attacks and cut-and-paste attacks. Similarly, if ESP protects only integrity and does not fully protect against eavesdropping, it may provide weaker protection than AH. See ipsecah(7P). ESP Device ESP is implemented as a module that is auto-pushed on top of IP. Use the /dev/ipsecesp entry to tune ESP with ndd(1M). Algorithms ESPuses encryption and authentication algorithms. Authentication algorithms include HMAC-MD5 and HMAC-SHA-1. Encryption algorithms include DES, Triple-DES, Blowfish and AES. Each authentication and encryption algorithm contain key size and key format properties. You can obtain a list of authentication and encryption algorithms and their properties by using the ipsecalgs(1M) command. You can also use the functions described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms. Because of export laws in the United States, not all encryption algorithms are available outside of the United States. Security Considerations ESP without authentication exposes vulnerabilities to cut-and-paste cryptographic attacks as well as eavesdropping attacks. Like AH, ESP is vulnerable to eavesdropping when used without confidentiality. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsr (32-bit) | |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ipsecalgs(1M), ipsecconf(1M), ndd(1M), attributes(5), getipsecalgbyname(3NSL), ip(7P), ipsec(7P), ipsecah(7P) Kent, S. and Atkinson, R.RFC 2406, IP Encapsulating Security Payload (ESP), The Internet Society, 1998. SunOS 5.11 18 May 2003 ipsecesp(7P)