No that is not what the exploit pointed out. What the exploit illustrates
is that when a big company such as NAI acquires a firewall company like
TIS, and integrates the product with other product suites that extensive
quality control and assurance testing is absolute must .
Each firewall product on the market has its pluses and minuses, a
firewall is just one piece of a secure architecture.
If you do not use the CyberPatrol product, your firewall is less
susceptible to potential break in.
/m
"gramble none" <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
05/25/00 10:03 AM
To: [EMAIL PROTECTED]
cc:
Subject: Gauntlet Exploit
Hello all,
I have not noticed any topic about the exploit found on Gauntlet. Am I
the
only one who uses the Gauntlet firewall? This exploit blows my mind!
Gauntlet was supposed a very secure firewall and now I find out that not
only is there an exploit, but that the hacker could actually use the
firewall to run more attacks against my own company..! For the last
several
weeks I have had to worry about new viruses and before that it was Denial
of
Service attacks. Now those seem to mean nothing compared to my main
security device being turned into the perfect hackers dream! According to
Network associates, All the way back to Gauntlet 4.0 is vulnerable! How
long have hackers known about this? That means for the last couple years
anyone could have been hacking my site and I would have no record of it.
What else have I not been told!
_Gramble_
________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]