CVE-2017-7440
Summary
| CVE | CVE-2017-7440 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-05-02 14:59:00 UTC |
| Updated | 2024-01-26 18:02:00 UTC |
| Description | Kerio Connect 8.0.0 through 9.2.2, and Kerio Connect Client desktop application for Windows and Mac 9.2.0 through 9.2.2, when e-mail preview is enabled, allows remote attackers to conduct clickjacking attacks via a crafted e-mail message. |
Risk And Classification
Problem Types: CWE-1021
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Apple | Macos | - | All | All | All |
| Application | Gfi | Kerio Connect | All | All | All | All |
| Application | Gfi | Kerio Connect Client | All | All | All | All |
| Application | Kerio | Connect | 8.0.0 | All | All | All |
| Application | Kerio | Connect | 8.0.1 | All | All | All |
| Application | Kerio | Connect | 8.0.2 | All | All | All |
| Application | Kerio | Connect | 8.1.0 | All | All | All |
| Application | Kerio | Connect | 8.1.1 | All | All | All |
| Application | Kerio | Connect | 8.1.2 | All | All | All |
| Application | Kerio | Connect | 8.1.3 | All | All | All |
| Application | Kerio | Connect | 8.2.0 | All | All | All |
| Application | Kerio | Connect | 8.2.1 | All | All | All |
| Application | Kerio | Connect | 8.2.2 | All | All | All |
| Application | Kerio | Connect | 8.2.3 | All | All | All |
| Application | Kerio | Connect | 8.2.4 | All | All | All |
| Application | Kerio | Connect | 8.3.0 | All | All | All |
| Application | Kerio | Connect | 8.3.1 | All | All | All |
| Application | Kerio | Connect | 8.3.2 | All | All | All |
| Application | Kerio | Connect | 8.3.3 | All | All | All |
| Application | Kerio | Connect | 8.3.4 | All | All | All |
| Application | Kerio | Connect | 8.4.0 | All | All | All |
| Application | Kerio | Connect | 8.4.1 | All | All | All |
| Application | Kerio | Connect | 8.4.2 | All | All | All |
| Application | Kerio | Connect | 8.4.3 | All | All | All |
| Application | Kerio | Connect | 8.5.0 | All | All | All |
| Application | Kerio | Connect | 8.5.1 | All | All | All |
| Application | Kerio | Connect | 8.5.2 | All | All | All |
| Application | Kerio | Connect | 8.5.3 | All | All | All |
| Application | Kerio | Connect | 9.0.0 | All | All | All |
| Application | Kerio | Connect | 9.0.1 | All | All | All |
| Application | Kerio | Connect | 9.0.2 | All | All | All |
| Application | Kerio | Connect | 9.0.3 | All | All | All |
| Application | Kerio | Connect | 9.0.4 | All | All | All |
| Application | Kerio | Connect | 9.1.0 | All | All | All |
| Application | Kerio | Connect | 9.1.1 | All | All | All |
| Application | Kerio | Connect | 9.2.0 | All | All | All |
| Application | Kerio | Connect | 9.2.1 | All | All | All |
| Application | Kerio | Connect | 9.2.2 | All | All | All |
| Application | Kerio | Connect | 8.0.0 | All | All | All |
| Application | Kerio | Connect | 8.0.1 | All | All | All |
| Application | Kerio | Connect | 8.0.2 | All | All | All |
| Application | Kerio | Connect | 8.1.0 | All | All | All |
| Application | Kerio | Connect | 8.1.1 | All | All | All |
| Application | Kerio | Connect | 8.1.2 | All | All | All |
| Application | Kerio | Connect | 8.1.3 | All | All | All |
| Application | Kerio | Connect | 8.2.0 | All | All | All |
| Application | Kerio | Connect | 8.2.1 | All | All | All |
| Application | Kerio | Connect | 8.2.2 | All | All | All |
| Application | Kerio | Connect | 8.2.3 | All | All | All |
| Application | Kerio | Connect | 8.2.4 | All | All | All |
| Application | Kerio | Connect | 8.3.0 | All | All | All |
| Application | Kerio | Connect | 8.3.1 | All | All | All |
| Application | Kerio | Connect | 8.3.2 | All | All | All |
| Application | Kerio | Connect | 8.3.3 | All | All | All |
| Application | Kerio | Connect | 8.3.4 | All | All | All |
| Application | Kerio | Connect | 8.4.0 | All | All | All |
| Application | Kerio | Connect | 8.4.1 | All | All | All |
| Application | Kerio | Connect | 8.4.2 | All | All | All |
| Application | Kerio | Connect | 8.4.3 | All | All | All |
| Application | Kerio | Connect | 8.5.0 | All | All | All |
| Application | Kerio | Connect | 8.5.1 | All | All | All |
| Application | Kerio | Connect | 8.5.2 | All | All | All |
| Application | Kerio | Connect | 8.5.3 | All | All | All |
| Application | Kerio | Connect | 9.0.0 | All | All | All |
| Application | Kerio | Connect | 9.0.1 | All | All | All |
| Application | Kerio | Connect | 9.0.2 | All | All | All |
| Application | Kerio | Connect | 9.0.3 | All | All | All |
| Application | Kerio | Connect | 9.0.4 | All | All | All |
| Application | Kerio | Connect | 9.1.0 | All | All | All |
| Application | Kerio | Connect | 9.1.1 | All | All | All |
| Application | Kerio | Connect | 9.2.0 | All | All | All |
| Application | Kerio | Connect | 9.2.1 | All | All | All |
| Application | Kerio | Connect | 9.2.2 | All | All | All |
| Application | Kerio | Connect Client Desktop Application For Windows And Mac | 9.2.0 | All | All | All |
| Application | Kerio | Connect Client Desktop Application For Windows And Mac | 9.2.1 | All | All | All |
| Application | Kerio | Connect Client Desktop Application For Windows And Mac | 9.2.2 | All | All | All |
| Application | Kerio | Connect Client Desktop Application For Windows And Mac | 9.2.0 | All | All | All |
| Application | Kerio | Connect Client Desktop Application For Windows And Mac | 9.2.1 | All | All | All |
| Application | Kerio | Connect Client Desktop Application For Windows And Mac | 9.2.2 | All | All | All |
| Operating System | Microsoft | Windows | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Clickjacking vulnerability in Kerio Connect 8 and 9 (CVE-2017-7440) – GFI Support | MISC | www.gfi.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.