You should go to www.securityfocus.com This was posted alsmost two weeks
ago in the bugtraq mailing list. It's a great resource for recent exploits
and Vulnerability information.


""Atif Awan"" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
>
> According to cisco :
>
> The Cisco Secure PIX Firewall cannot distinguish between a forged TCP
Reset
> (RST) packet and a genuine TCP RST packet. Any TCP/IP connection
established
> through the Cisco Secure PIX Firewall can be terminated by a third party
> from the untrusted network if the connection can be uniquely determined.
> This vulnerability is independent of configuration. There is no
workaround.
> This vulnerability exists in all Cisco Secure PIX Firewall software
releases
> up to and including 4.2(5), 4.4(4), 5.0(3) and 5.1(1). The defect has been
> assigned Cisco bug ID CSCdr11711.
>
> This notice is posted at
> http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml on Cisco's
> Worldwide Web site.
>
> Atif
>
>
> ___________________________________
> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
> FAQ, list archives, and subscription info: http://www.groupstudy.com
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> ---


___________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to