[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <200402050828.10586.jeremiah@nur.net>
From: jeremiah at nur.net (Jeremiah Cornelius)
Subject: Buffer Overflow in ISAKMP-Process at Checkpoint VPN-1 (the VPN component commonly deployed on Checkpoint Firewall-1 installations)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Thursday 05 February 2004 02:58, Olaf Hahn wrote:
> There is no effective workaround for this vulnerability. Upgrading to the
> NG versions of VPN-1 Server and SecureRemote/Client will remove this
> vulnerability.
>
> Checkpoint no longer supports the versions of VPN-1 and SecureRemote/
> SecureClient affected by this vulnerability. Checkpoint recommends that
> all affected users upgrade to Firewall-1 NG FP1 or greater.
The rest of the known world recommends upgrading to Netscreen.
In related news, Ford Motors is no longer supporting the 1997 Taurus, and
Airbus says those still flying pre -1989 A300s are on their own for sourcing
parts and maintenance.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFAIm8YJi2cv3XsiSARAjcNAJ0RK7tjJVH+yzmW4lSLI0lrGFY0kQCgkMOT
Ewk0VqMm+7rLnqPZk/PXBQ0=
=eLid
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists