-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday 05 February 2004 02:58, Olaf Hahn wrote: > There is no effective workaround for this vulnerability. Upgrading to the > NG versions of VPN-1 Server and SecureRemote/Client will remove this > vulnerability. > > Checkpoint no longer supports the versions of VPN-1 and SecureRemote/ > SecureClient affected by this vulnerability. Checkpoint recommends that > all affected users upgrade to Firewall-1 NG FP1 or greater.
The rest of the known world recommends upgrading to Netscreen. In related news, Ford Motors is no longer supporting the 1997 Taurus, and Airbus says those still flying pre -1989 A300s are on their own for sourcing parts and maintenance. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAIm8YJi2cv3XsiSARAjcNAJ0RK7tjJVH+yzmW4lSLI0lrGFY0kQCgkMOT Ewk0VqMm+7rLnqPZk/PXBQ0= =eLid -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
