"If a continuous stream of fragmented IP datagrams with a particular
malformation were sent to an affected machine...."

Do we know for sure if Gauntlet (plug or proxy) or Checkpoint (stateful
inspection) can block this vulnerability?

Thanks!
Steve


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to