[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1779CE9992706F45BDC9575124A5AAE50122188A@a0001-xpo0114-s.hodc.ad.allstate.com>
Date: Fri, 21 Mar 2003 12:59:20 -0600
From: "Hines, Eric" <ehin4@...state.com>
To: dchesterfield@...kofny.com
Subject: RE: Check Point FW-1 NG FP3 & FP3 HF1: DoS attack against syslog
daemon possible
Alright. I was just concerned because of the wording Checkpoint used on
their web site.
"Prior to the release of NG FP3 HF2......."
I'm going to assume they were referring to the HF2 portion of that, and not
< FP3
Eric Hines
-----Original Message-----
From: dchesterfield@...kofny.com [mailto:dchesterfield@...kofny.com]
Sent: Friday, March 21, 2003 12:53 PM
To: Hines, Eric
Cc: Maillist Bugtraq; Dr. Peter Bieringer
Subject: Re: Check Point FW-1 NG FP3 & FP3 HF1: DoS attack against
syslog daemon possible
The daemon was apparently only introduced since FP3
"Hines, Eric"
<ehin4@...state.c To: "Dr. Peter
Bieringer" <pbieringer@...asec.de>, Maillist Bugtraq
om> <bugtraq@...urityfocus.com>
cc:
21/03/2003 06:31 Subject: Re: Check Point
FW-1 NG FP3 & FP3 HF1: DoS attack against syslog daemon
pm possible
Has anyone tested these vulnerabilities on NG FP1 or are they strictly
related to FP3?
Eric Hines
-----Original Message-----
From: Dr. Peter Bieringer [mailto:pbieringer@...asec.de]
Sent: Friday, March 21, 2003 6:47 AM
To: Maillist Bugtraq; Maillist full-disclosure
Subject: Check Point FW-1 NG FP3 & FP3 HF1: DoS attack against syslog
daemon possible
Hi all,
interesting for all Check Point FW-1 NG users which have enabled the
since
FP3 included syslog daemon.
Powered by blists - more mailing lists