Bugtraq mailing list archives
FireWall-1 Port 264 Vulnerability response
From: Scott Walker Register <scott.register () US CHECKPOINT COM>
Date: Mon, 31 Jul 2000 17:58:06 -0500
Recently, a message was posted to this mailing list with the following assertion: If you flood port 264 ( FW1_topo ) from your local network, the Firewall-1 CPU reaches 100% and nobody can connect with GUI ( neither on the firewall itself ). However, after extensive testing using the source code provided by the author and other tools, Check Point has been unable to reproduce the error condition described. Check Point takes this and all other potential security issues very seriously; however, after thorough examination and testing, we do not believe this in an actual vulnerability. If anyone has successfully reproduced this condition or has further information, please contact SECURITY-ALERT () checkpoint com. Thanks, -SwR ---------------------------------------------------------------- Scott.Register () us CheckPoint com || FireWall-1 Product Manager Check Point Software Technologies, Inc. 2255 Glades Road / Suite 324A \ Boca Raton, FL 33431 Voice: 561.989.5418 | Fax: 561.997.5421 | 07/31/00 17:58:06 ----------------------------------------------------------------
Current thread:
- FireWall-1 Port 264 Vulnerability response Scott Walker Register (Aug 01)