Connect. Communicate. Collaborate. Securely.

Home » Kerio User Forums » Kerio Control » Clientless SSL VPN products break web browser domain-based security models (US-CERT vulnerabily note VU#261869)
  •  
moos

Messages: 6
Karma: 0
Send a private message to this user
After reading that document where KWF is not listed, is it still safe to deploy SSL clientless VPN waiting a patch or an update?

ref: http://www.kb.cert.org/vuls/id/261869

[Updated on: Wed, 13 January 2010 18:35]

  •  
Pavel Dobry (Kerio)

Messages: 5245
Karma: 251
Send a private message to this user
As you can see in the document, all Kerio products ARE NOT affected by this vulnerability. Just click on the link in the document to see why.
  •  
moos

Messages: 6
Karma: 0
Send a private message to this user
uhm sorry, i missed the row, in that case we can consider i made Kerio a good advertising Razz
Previous Topic: Dial up routing issue with default gateway
Next Topic: All Traffic Blocked after installation in Win2k8 sp2 x64
Goto Forum:
  


Disclaimer:
Kerio discussion forums are intended for open communication between forum members and may contain information and material posted by members which may be useful in learning about Kerio products. The discussion forums are not intended to provide technical support for any specific product. Any information implied or expressed in the discussion forums is that of the posting member. Kerio is in no way responsible for the information posted in the forums, or its accuracy. Kerio employees may participate in the discussions, but their postings do not represent an offical position of the company on any issues raised or discussed. Kerio reserves the right to monitor and maintain the forums to promote free and accurate exchange of information.

Current Time: Mon Sep 25 17:13:42 CEST 2017

Total time taken to generate the page: 0.00387 seconds
.:: Contact :: Home ::.
Powered by: FUDforum 3.0.4.