Bugtraq mailing list archives

FireWall-1 Port 264 Vulnerability response


From: Scott Walker Register <scott.register () US CHECKPOINT COM>
Date: Mon, 31 Jul 2000 17:58:06 -0500

Recently, a message was posted to this mailing list with the following assertion:

    If you flood port 264 ( FW1_topo ) from your local network, the Firewall-1
     CPU reaches 100% and nobody can connect with GUI ( neither on the firewall
     itself ).

However, after extensive testing using the source code provided by the author and other tools, Check Point has been 
unable to reproduce the error condition described.  Check Point takes this and all other potential security issues very 
seriously; however, after thorough examination and testing, we do not believe this in an actual vulnerability.  If 
anyone has successfully reproduced this condition or has further information, please contact SECURITY-ALERT () 
checkpoint com.

Thanks,
-SwR

----------------------------------------------------------------
Scott.Register () us CheckPoint com  ||  FireWall-1 Product Manager
               Check Point Software Technologies, Inc.
2255 Glades Road    /    Suite 324A     \  Boca Raton, FL  33431
Voice: 561.989.5418 | Fax: 561.997.5421  |   07/31/00   17:58:06
----------------------------------------------------------------


Current thread: